insights-operator/gathers.json0000640000000000000000000004623615156562615015300 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":131,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":5,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":137,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":133,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":126,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":125,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":237,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":255,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":32,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":84,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":127,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":210,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":229,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":5,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":128,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":186,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":236,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":237,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":248,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":17031,"records_count":58,"errors":["the record with the same name \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-8sxdf.json\" was already recorded and had the fingerprint \"ace1bbfd675f4bacc0b776ee831794c5629ec141f5de2ca7e09e336f72504964\", overwriting with the record having fingerprint \"ace1bbfd675f4bacc0b776ee831794c5629ec141f5de2ca7e09e336f72504964\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-rws9x.json\" was already recorded and had the fingerprint \"7e8e61be1e7f8895b03851af34b5ceac12e2490cf527a5f0b5d87a32e0bcb07e\", overwriting with the record having fingerprint \"7e8e61be1e7f8895b03851af34b5ceac12e2490cf527a5f0b5d87a32e0bcb07e\"","the record with the same name \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-p72m2.json\" was already recorded and had the fingerprint \"2ef9ae2514fbb6e4acc5c8f2a03bb65801d24eb08dfec0586739020c1ebca372\", overwriting with the record having fingerprint \"2ef9ae2514fbb6e4acc5c8f2a03bb65801d24eb08dfec0586739020c1ebca372\"","the record with the same name \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-qk279.json\" was already recorded and had the fingerprint \"fa55d025dc2c051b86210b0757755c8e9f72ac8a20da57dac590267cfb296b5f\", overwriting with the record having fingerprint \"fa55d025dc2c051b86210b0757755c8e9f72ac8a20da57dac590267cfb296b5f\"","the record with the same name \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-wlfj4.json\" was already recorded and had the fingerprint \"218ac84a8b3b0237e700e7b068c9da5674e7435805ce2f8da65e13df92f15c12\", overwriting with the record having fingerprint \"218ac84a8b3b0237e700e7b068c9da5674e7435805ce2f8da65e13df92f15c12\"","the record with the same name \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-t266j.json\" was already recorded and had the fingerprint \"dc971cf573e04dd2ab16d680508fd7842f39d1fdc58c51a63c066a9de47f17b0\", overwriting with the record having fingerprint \"dc971cf573e04dd2ab16d680508fd7842f39d1fdc58c51a63c066a9de47f17b0\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-rws9x.json\" was already recorded and had the fingerprint \"7e8e61be1e7f8895b03851af34b5ceac12e2490cf527a5f0b5d87a32e0bcb07e\", overwriting with the record having fingerprint \"7e8e61be1e7f8895b03851af34b5ceac12e2490cf527a5f0b5d87a32e0bcb07e\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-rws9x/etcd-operator_previous.log\" was already recorded and had the fingerprint \"1a21039185945cbdfdd5f70607a97a4e95a6d23e27baa8545620cba2def05424\", overwriting with the record having fingerprint \"1a21039185945cbdfdd5f70607a97a4e95a6d23e27baa8545620cba2def05424\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-rws9x/etcd-operator_current.log\" was already recorded and had the fingerprint \"70c6d5490b5d673750c7d385829b8224078e682ed5ba2895b6e76a596ed347f1\", overwriting with the record having fingerprint \"70c6d5490b5d673750c7d385829b8224078e682ed5ba2895b6e76a596ed347f1\"","the record with the same name \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-6qqz4.json\" was already recorded and had the fingerprint \"547274c86da2429f87c51c1966905bd6b830e246e0d19823788119b4662f4cfc\", overwriting with the record having fingerprint \"8b08ad60d833d15bd1db56521b65d00ebc6c3abdca8eb5381d1849b88ac39d89\""],"warnings":["warning: the record with the same fingerprint \"ace1bbfd675f4bacc0b776ee831794c5629ec141f5de2ca7e09e336f72504964\" was already recorded at path \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-8sxdf.json\", recording another one with a different path \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-8sxdf.json\"","warning: the record with the same fingerprint \"7e8e61be1e7f8895b03851af34b5ceac12e2490cf527a5f0b5d87a32e0bcb07e\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-rws9x.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-rws9x.json\"","warning: the record with the same fingerprint \"2ef9ae2514fbb6e4acc5c8f2a03bb65801d24eb08dfec0586739020c1ebca372\" was already recorded at path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-p72m2.json\", recording another one with a different path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-p72m2.json\"","warning: the record with the same fingerprint \"fa55d025dc2c051b86210b0757755c8e9f72ac8a20da57dac590267cfb296b5f\" was already recorded at path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-qk279.json\", recording another one with a different path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-qk279.json\"","warning: the record with the same fingerprint \"218ac84a8b3b0237e700e7b068c9da5674e7435805ce2f8da65e13df92f15c12\" was already recorded at path \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-wlfj4.json\", recording another one with a different path \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-wlfj4.json\"","warning: the record with the same fingerprint \"dc971cf573e04dd2ab16d680508fd7842f39d1fdc58c51a63c066a9de47f17b0\" was already recorded at path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-t266j.json\", recording another one with a different path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-t266j.json\"","warning: the record with the same fingerprint \"7e8e61be1e7f8895b03851af34b5ceac12e2490cf527a5f0b5d87a32e0bcb07e\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-rws9x.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-rws9x.json\"","warning: the record with the same fingerprint \"1a21039185945cbdfdd5f70607a97a4e95a6d23e27baa8545620cba2def05424\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-rws9x/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-rws9x/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"70c6d5490b5d673750c7d385829b8224078e682ed5ba2895b6e76a596ed347f1\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-rws9x/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-rws9x/etcd-operator_current.log\""],"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":9,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":32,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":85,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":133,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":132,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":179,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10842,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":132,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":128,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":131,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5444,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":6,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":378,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":273,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/machines","duration_in_ms":128,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":5,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":130,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":17040,"records_count":155,"errors":["function \"machine_autoscalers\" failed with an error","function \"support_secret\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-8sxdf.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-rws9x.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-p72m2.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-qk279.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-wlfj4.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-t266j.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-rws9x.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-rws9x/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-rws9x/etcd-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-6qqz4.json\""],"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11607,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":86,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":89,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":129,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5443,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":129,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":127,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":129,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":128,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":128,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":125,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":207,"records_count":19,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":5,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":85,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":131,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":196,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":23.279,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515156562615017776 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515156562615021100 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005333715156562615014264 0ustar0000000000000000{"pods":77,"imageCount":64,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:86833de447f25d1d0fc15ed5460c5068cc48b18b78b8108304c5b5fd1dff04ab","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:c3c12b935527854220bc939cf4b1e9ec5ea7b799b5530ba0609ec64f044c0a36","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:90dc03981a3a33aadde1815815ad5068886ae546bd3162c9a87a99fcc07dbbce","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f2c59d19eb73ad5c0f93b0a63003c1885f5297959c9c45b401d1a74aea6e76","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cdd28dfe7132e19af9f013f72cf120d970bc31b6b74693af262f8d2e82a096e1","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:de91abd5ad76fb491881a75a0feb4b8ca5600ceb5e15a4b0b687ada01ea0a44c","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9174864cd47431966d033d283bc7836e7ca579139ef85c36275db542fda80803","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:97c7a635130c574a2c501091bb44f17cd92e05e29b5102e59578b5885d9bfec0","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011400015156562607033661 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-b8b994c95-kglwt2026-03-18T17:45:31.830323802Z E0318 17:45:31.830022 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:45:31.830323802Z E0318 17:45:31.830198 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:45:49.760455577Z W0318 17:45:49.760346 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.109.235:50051: connect: connection refused" 2026-03-18T17:45:49.846918239Z W0318 17:45:49.846806 1 logging.go:55] [core] [Channel #5 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.25.124:50051: connect: connection refused" 2026-03-18T17:45:55.447349453Z E0318 17:45:55.447196 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:45:55.453091421Z W0318 17:45:55.453007 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.102.144:50051: connect: connection refused" 2026-03-18T17:45:55.471485086Z E0318 17:45:55.468426 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:45:56.442883391Z E0318 17:45:56.442767 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:45:56.443139787Z E0318 17:45:56.443079 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:45:56.443314961Z E0318 17:45:56.443262 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:45:56.443498776Z E0318 17:45:56.443435 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:45:56.450441644Z E0318 17:45:56.448744 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:01.837312360Z E0318 17:46:01.837147 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:01.837943135Z E0318 17:46:01.837853 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:01.837977926Z E0318 17:46:01.837936 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:01.838317244Z E0318 17:46:01.838203 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:01.844576826Z E0318 17:46:01.844471 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:07.829797370Z time="2026-03-18T17:46:07Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T17:46:07.829885632Z time="2026-03-18T17:46:07Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.109.235:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-18T17:46:13.895396658Z W0318 17:46:13.894584 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.165.144:50051: connect: connection refused" 2026-03-18T17:46:25.454709142Z E0318 17:46:25.454303 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:25.454709142Z E0318 17:46:25.454439 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:25.454709142Z E0318 17:46:25.454671 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:25.455043291Z E0318 17:46:25.454996 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:25.455307939Z E0318 17:46:25.455216 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:31.853889175Z E0318 17:46:31.853800 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:31.854039519Z E0318 17:46:31.853984 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:31.854361868Z E0318 17:46:31.854311 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:31.854503422Z E0318 17:46:31.854453 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:31.854647086Z E0318 17:46:31.854602 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.404831675Z E0318 17:46:55.404534 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.404831675Z E0318 17:46:55.404748 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.409536304Z E0318 17:46:55.409478 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.409642377Z E0318 17:46:55.409603 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.409997197Z E0318 17:46:55.409958 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.522189785Z E0318 17:46:55.522149 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.528963271Z E0318 17:46:55.528947 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:01.864961996Z E0318 17:47:01.862764 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:01.864961996Z E0318 17:47:01.862965 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:01.864961996Z E0318 17:47:01.863009 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:01.864961996Z E0318 17:47:01.864220 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:01.874766094Z E0318 17:47:01.874686 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:16.981824592Z time="2026-03-18T17:47:16Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T17:47:16.981824592Z time="2026-03-18T17:47:16Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.102.144:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-18T17:47:16.986115599Z time="2026-03-18T17:47:16Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T17:47:16.986209901Z time="2026-03-18T17:47:16Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.165.144:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-18T17:47:23.983971476Z time="2026-03-18T17:47:23Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T17:47:23.983971476Z time="2026-03-18T17:47:23Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.109.235:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-18T17:47:23.985637030Z time="2026-03-18T17:47:23Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-18T17:47:23.985723173Z time="2026-03-18T17:47:23Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.25.124:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-18T17:47:24.976405040Z time="2026-03-18T17:47:24Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T17:47:24.976405040Z time="2026-03-18T17:47:24Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.102.144:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-18T17:47:25.171049495Z time="2026-03-18T17:47:25Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T17:47:25.171098107Z time="2026-03-18T17:47:25Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.165.144:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-18T17:47:25.407450892Z E0318 17:47:25.403339 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.407450892Z E0318 17:47:25.403541 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.407450892Z E0318 17:47:25.403557 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.407450892Z E0318 17:47:25.403925 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.407450892Z E0318 17:47:25.403971 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:27.461530735Z time="2026-03-18T17:47:27Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T17:47:27.461530735Z time="2026-03-18T17:47:27Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.109.235:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-18T17:47:27.861557046Z time="2026-03-18T17:47:27Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-18T17:47:27.861633239Z time="2026-03-18T17:47:27Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.25.124:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-18T17:47:28.860356711Z time="2026-03-18T17:47:28Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T17:47:28.860453205Z time="2026-03-18T17:47:28Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.102.144:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-18T17:47:29.374876245Z time="2026-03-18T17:47:29Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T17:47:29.374974199Z time="2026-03-18T17:47:29Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.165.144:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-18T17:47:31.884761203Z E0318 17:47:31.883823 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:31.884761203Z E0318 17:47:31.883936 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:31.884761203Z E0318 17:47:31.884195 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:31.884761203Z E0318 17:47:31.884371 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:31.884761203Z E0318 17:47:31.884514 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:38.766602209Z W0318 17:47:38.766487 1 logging.go:55] [core] [Channel #5 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.25.124:50051: connect: connection refused" 2026-03-18T17:47:42.689104280Z W0318 17:47:42.689039 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.109.235:50051: connect: connection refused" 2026-03-18T17:47:55.422091137Z E0318 17:47:55.421983 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.422091137Z E0318 17:47:55.422038 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.422175991Z E0318 17:47:55.422135 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.422443201Z E0318 17:47:55.422408 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.422606498Z E0318 17:47:55.422557 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.462235247Z E0318 17:47:55.460090 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.465528943Z E0318 17:47:55.465434 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:01.902440286Z E0318 17:48:01.900908 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:01.902440286Z E0318 17:48:01.900956 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:01.902440286Z E0318 17:48:01.901017 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:01.902440286Z E0318 17:48:01.901018 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:01.902440286Z E0318 17:48:01.901233 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:05.596434321Z W0318 17:48:05.595719 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.102.144:50051: connect: connection refused" 2026-03-18T17:48:07.053093031Z W0318 17:48:07.052974 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.165.144:50051: connect: connection refused" 2026-03-18T17:48:25.407043916Z E0318 17:48:25.406967 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.411321039Z E0318 17:48:25.407595 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.416720644Z E0318 17:48:25.409725 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.416720644Z E0318 17:48:25.412523 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.416720644Z E0318 17:48:25.409736 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:31.908607000Z E0318 17:48:31.908550 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:31.909077463Z E0318 17:48:31.908842 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:31.909077463Z E0318 17:48:31.908900 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:31.909077463Z E0318 17:48:31.908975 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:31.909077463Z E0318 17:48:31.908998 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:38.809201800Z time="2026-03-18T17:48:38Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T17:48:38.809255412Z time="2026-03-18T17:48:38Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.102.144:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" package-server-manager_current.log0000640000000000000000000000731015156562607036715 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-6qqz42026-03-18T17:48:05.992975500Z 2026-03-18T17:48:05Z INFO setup starting manager 2026-03-18T17:48:05.993652936Z 2026-03-18T17:48:05Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-18T17:48:05.993791071Z 2026-03-18T17:48:05Z INFO controller-runtime.metrics Starting metrics server 2026-03-18T17:48:05.994129794Z I0318 17:48:05.994094 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-18T17:48:05.994205126Z 2026-03-18T17:48:05Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-18T17:48:05.994247068Z 2026-03-18T17:48:05Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-18T17:48:06.013635017Z I0318 17:48:06.013559 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-18T17:48:06.014474319Z 2026-03-18T17:48:06Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-18T17:48:06.014524211Z 2026-03-18T17:48:06Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-18T17:48:06.014547712Z 2026-03-18T17:48:06Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-18T17:48:06.015266339Z 2026-03-18T17:48:06Z DEBUG events package-server-manager-7b95f86987-6qqz4_1d79e79c-61d8-4123-8ff3-135af64b70d1 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"184a96a3-239c-4546-ad48-edca2f58841b","apiVersion":"coordination.k8s.io/v1","resourceVersion":"9605"}, "reason": "LeaderElection"} 2026-03-18T17:48:06.139134909Z 2026-03-18T17:48:06Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-18T17:48:06.139363317Z 2026-03-18T17:48:06Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-18T17:48:06.139612517Z 2026-03-18T17:48:06Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:48:06.139612517Z 2026-03-18T17:48:06Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:06.456831563Z 2026-03-18T17:48:06Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:06.456831563Z 2026-03-18T17:48:06Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:48:06.495320710Z 2026-03-18T17:48:06Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:48:06.495320710Z 2026-03-18T17:48:06Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415156562607035420 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-6qqz42026-03-18T17:42:29.236417073Z W0318 17:42:29.233881 1 deprecated.go:66] 2026-03-18T17:42:29.236417073Z ==== Removed Flag Warning ====================== 2026-03-18T17:42:29.236417073Z 2026-03-18T17:42:29.236417073Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-18T17:42:29.236417073Z 2026-03-18T17:42:29.236417073Z =============================================== 2026-03-18T17:42:29.236417073Z 2026-03-18T17:42:29.236417073Z I0318 17:42:29.234461 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-18T17:42:29.236417073Z I0318 17:42:29.235908 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-18T17:42:29.239230395Z I0318 17:42:29.239187 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-18T17:42:29.240967204Z I0318 17:42:29.239954 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 package-server-manager_previous.log0000640000000000000000000004610515156562607037114 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-6qqz42026-03-18T17:42:43.100185131Z 2026-03-18T17:42:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:42:43.100185131Z 2026-03-18T17:42:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.413966987Z 2026-03-18T17:42:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.413966987Z 2026-03-18T17:42:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:42:43.490731916Z 2026-03-18T17:42:43Z INFO controllers.packageserver attempting to create the packageserver csv 2026-03-18T17:42:43.519644953Z 2026-03-18T17:42:43Z INFO controllers.packageserver updating csv spec 2026-03-18T17:42:43.600444311Z 2026-03-18T17:42:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-03-18T17:42:43.600526393Z 2026-03-18T17:42:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.600656186Z 2026-03-18T17:42:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:42:43.600686956Z 2026-03-18T17:42:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.600778988Z 2026-03-18T17:42:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.600834170Z 2026-03-18T17:42:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:42:43.674336917Z 2026-03-18T17:42:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:42:43.674336917Z 2026-03-18T17:42:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.689580252Z 2026-03-18T17:42:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:42:43.689635633Z 2026-03-18T17:42:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.689751176Z 2026-03-18T17:42:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.689803647Z 2026-03-18T17:42:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:42:43.746564447Z 2026-03-18T17:42:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:42:43.746564447Z 2026-03-18T17:42:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.764396139Z 2026-03-18T17:42:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:42:43.764396139Z 2026-03-18T17:42:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.768377307Z 2026-03-18T17:42:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.768377307Z 2026-03-18T17:42:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:42:43.876725211Z 2026-03-18T17:42:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:42:43.876725211Z 2026-03-18T17:42:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.876956506Z 2026-03-18T17:42:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:42:43.876956506Z 2026-03-18T17:42:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.877064359Z 2026-03-18T17:42:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:43.877124520Z 2026-03-18T17:42:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:42:43.931094878Z 2026-03-18T17:42:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:42:43.931094878Z 2026-03-18T17:42:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:44.725836289Z 2026-03-18T17:42:44Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:42:44.725836289Z 2026-03-18T17:42:44Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:44.725952512Z 2026-03-18T17:42:44Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:44.725952512Z 2026-03-18T17:42:44Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:42:44.741505885Z 2026-03-18T17:42:44Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:42:44.741505885Z 2026-03-18T17:42:44Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:51.684329099Z 2026-03-18T17:42:51Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:42:51.684329099Z 2026-03-18T17:42:51Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:51.684329099Z 2026-03-18T17:42:51Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:51.684329099Z 2026-03-18T17:42:51Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:42:51.733384679Z 2026-03-18T17:42:51Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:42:51.733384679Z 2026-03-18T17:42:51Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:51.860882394Z 2026-03-18T17:42:51Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:42:51.860944996Z 2026-03-18T17:42:51Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:51.861044268Z 2026-03-18T17:42:51Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:42:51.861094809Z 2026-03-18T17:42:51Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:42:51.912005690Z 2026-03-18T17:42:51Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:42:51.912059642Z 2026-03-18T17:42:51Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:44:16.975540766Z E0318 17:44:16.974366 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-18T17:45:16.977612602Z E0318 17:45:16.977425 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-03-18T17:46:50.988671221Z E0318 17:46:50.988532 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-18T17:47:42.968784476Z E0318 17:47:42.968592 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-operator-lifecycle-manager/leases/packageserver-controller-lock": context deadline exceeded 2026-03-18T17:47:42.968784476Z I0318 17:47:42.968695 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition 2026-03-18T17:48:03.534865293Z 2026-03-18T17:48:03Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:48:03.535068101Z 2026-03-18T17:48:03Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:03.536741394Z 2026-03-18T17:48:03Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:03.536741394Z 2026-03-18T17:48:03Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:48:03.559521882Z 2026-03-18T17:48:03Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:48:03.559521882Z 2026-03-18T17:48:03Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:03.722786484Z 2026-03-18T17:48:03Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:48:03.722890488Z 2026-03-18T17:48:03Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:03.723050234Z 2026-03-18T17:48:03Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:03.723131607Z 2026-03-18T17:48:03Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:48:03.747854188Z 2026-03-18T17:48:03Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:48:03.747933772Z 2026-03-18T17:48:03Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:03.846518328Z 2026-03-18T17:48:03Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:48:03.846518328Z 2026-03-18T17:48:03Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:03.846518328Z 2026-03-18T17:48:03Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:03.846518328Z 2026-03-18T17:48:03Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:48:03.877101983Z 2026-03-18T17:48:03Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:48:03.877101983Z 2026-03-18T17:48:03Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:04.697908637Z 2026-03-18T17:48:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:48:04.697908637Z 2026-03-18T17:48:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:04.697908637Z 2026-03-18T17:48:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:04.697908637Z 2026-03-18T17:48:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:48:04.720130614Z 2026-03-18T17:48:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:48:04.720130614Z 2026-03-18T17:48:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:04.828728970Z 2026-03-18T17:48:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T17:48:04.828728970Z 2026-03-18T17:48:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:04.828871006Z 2026-03-18T17:48:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:04.828920548Z 2026-03-18T17:48:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T17:48:04.848230424Z 2026-03-18T17:48:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T17:48:04.850675907Z 2026-03-18T17:48:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T17:48:05.159302576Z 2026-03-18T17:48:05Z ERROR setup problem running manager {"error": "leader election lost"} 2026-03-18T17:48:05.159302576Z main.run 2026-03-18T17:48:05.159302576Z /build/cmd/package-server-manager/main.go:150 2026-03-18T17:48:05.159302576Z github.com/spf13/cobra.(*Command).execute 2026-03-18T17:48:05.159302576Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-03-18T17:48:05.159302576Z github.com/spf13/cobra.(*Command).ExecuteC 2026-03-18T17:48:05.159302576Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-03-18T17:48:05.159302576Z github.com/spf13/cobra.(*Command).Execute 2026-03-18T17:48:05.159302576Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-03-18T17:48:05.159302576Z main.main 2026-03-18T17:48:05.159302576Z /build/cmd/package-server-manager/main.go:43 2026-03-18T17:48:05.159302576Z runtime.main 2026-03-18T17:48:05.159302576Z /usr/lib/golang/src/runtime/proc.go:271 2026-03-18T17:48:05.159302576Z Error: leader election lost 2026-03-18T17:48:05.159302576Z encountered an error while executing the binary: leader election lost config/pod/openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-6qqz4.json0000640000000000000000000002346215156562607030155 0ustar0000000000000000{"metadata":{"name":"package-server-manager-7b95f86987-6qqz4","generateName":"package-server-manager-7b95f86987-","namespace":"openshift-operator-lifecycle-manager","uid":"d26d4515-391e-41a5-8c82-1b2b8a375662","resourceVersion":"10301","creationTimestamp":"2026-03-18T17:40:19Z","labels":{"app":"package-server-manager","pod-template-hash":"7b95f86987"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.14/23\"],\"mac_address\":\"0a:58:0a:80:00:0e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.14/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.14\"\n ],\n \"mac\": \"0a:58:0a:80:00:0e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"package-server-manager-7b95f86987","uid":"42e328f6-b481-444e-b301-84e1707bd992","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"package-server-manager-serving-cert","secret":{"secretName":"package-server-manager-serving-cert","defaultMode":420}},{"name":"kube-api-access-bm8jj","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://127.0.0.1:9090/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--logtostderr=true"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-bm8jj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}},{"name":"package-server-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","command":["/bin/psm","start"],"args":["--name","$(PACKAGESERVER_NAME)","--namespace","$(PACKAGESERVER_NAMESPACE)","--metrics=:9090"],"env":[{"name":"PACKAGESERVER_NAME","value":"packageserver"},{"name":"PACKAGESERVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578"},{"name":"PACKAGESERVER_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"GOMEMLIMIT","value":"5MiB"}],"resources":{"requests":{"cpu":"10m","memory":"10Mi"}},"volumeMounts":[{"name":"kube-api-access-bm8jj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:43Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:43Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.14","podIPs":[{"ip":"10.128.0.14"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-18T17:42:29Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://42cf11d0de60ec502e81fb8ea6c5d36be2f208e38382f00aa22475b8b0c29e97","started":true,"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-bm8jj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"package-server-manager","state":{"running":{"startedAt":"2026-03-18T17:48:05Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"r\treconciliation result\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}, \"res\": \"unchanged\"}\n2026-03-18T17:48:04Z\tINFO\tcontrollers.packageserver\tfinished request reconciliation\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\n2026-03-18T17:48:04Z\tINFO\tcontrollers.packageserver\thandling current request\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}, \"request\": \"openshift-operator-lifecycle-manager/packageserver\"}\n2026-03-18T17:48:04Z\tINFO\tcontrollers.packageserver\tchecking to see if required RBAC exists\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\n2026-03-18T17:48:04Z\tINFO\tcontrollers.packageserver\tconfimed required RBAC exists\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\n2026-03-18T17:48:04Z\tINFO\tcontrollers.packageserver\tcurrently topology mode\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}, \"highly available\": false}\n2026-03-18T17:48:04Z\tINFO\tcontrollers.packageserver\treconciliation result\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}, \"res\": \"unchanged\"}\n2026-03-18T17:48:04Z\tINFO\tcontrollers.packageserver\tfinished request reconciliation\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\n2026-03-18T17:48:05Z\tERROR\tsetup\tproblem running manager\t{\"error\": \"leader election lost\"}\nmain.run\n\t/build/cmd/package-server-manager/main.go:150\ngithub.com/spf13/cobra.(*Command).execute\n\t/build/vendor/github.com/spf13/cobra/command.go:985\ngithub.com/spf13/cobra.(*Command).ExecuteC\n\t/build/vendor/github.com/spf13/cobra/command.go:1117\ngithub.com/spf13/cobra.(*Command).Execute\n\t/build/vendor/github.com/spf13/cobra/command.go:1041\nmain.main\n\t/build/cmd/package-server-manager/main.go:43\nruntime.main\n\t/usr/lib/golang/src/runtime/proc.go:271\nError: leader election lost\nencountered an error while executing the binary: leader election lost\n","startedAt":"2026-03-18T17:42:42Z","finishedAt":"2026-03-18T17:48:05Z","containerID":"cri-o://c08cd14fe1ce6dcf04e7916d9d5a8cb80981c4007a423a03755dfeee8e27eeb4"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","containerID":"cri-o://2bf18e51a1823185cc3f2ac648f42885a8d2aea94913a831a7d4285f0b01a344","started":true,"volumeMounts":[{"name":"kube-api-access-bm8jj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}olm-operator_current.log0000640000000000000000000005177415156562607033047 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-5c9796789-6hngr2026-03-18T17:48:45.430562072Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=6R9LO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:45.443797823Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=QpNsf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:45.490686858Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=Bh4kF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:45.590484257Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=FZFzN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:45.692228190Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=eHiJO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:45.791160614Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=slzp4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:45.804093717Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=GT3m5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:45.812199395Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=Egndb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:45.820398115Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=EAKY9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:45.828527883Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=y13cZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:45.892066384Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=ciQqE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:45.993346275Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=lIQKZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.000343991Z time="2026-03-18T17:48:45Z" level=info msg="install strategy successful" csv=packageserver id=HLLU6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.007218344Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=o7E1J namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.015295720Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=yZ+G1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.022299657Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=3ar48 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.034312863Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=pIfNl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.043300745Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=WnnLX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.053299666Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=Qd0pZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.138344361Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=pcoP0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.237951795Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=NkNwN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.338680999Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=2iN8B namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.448661243Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=72Iil namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.544336176Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=LfFlN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.638804656Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=0+3Ko namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.737887654Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=T4CHL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.838574988Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=STw+n namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:46.937675448Z time="2026-03-18T17:48:46Z" level=info msg="install strategy successful" csv=packageserver id=gU2xu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:47.038644719Z time="2026-03-18T17:48:47Z" level=info msg="install strategy successful" csv=packageserver id=Jv7aq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:47.140003132Z time="2026-03-18T17:48:47Z" level=info msg="install strategy successful" csv=packageserver id=GLlL8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:47.239000718Z time="2026-03-18T17:48:47Z" level=info msg="install strategy successful" csv=packageserver id=KGTb6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:47.341245455Z time="2026-03-18T17:48:47Z" level=info msg="install strategy successful" csv=packageserver id=XCrIk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:47.442139375Z time="2026-03-18T17:48:47Z" level=info msg="install strategy successful" csv=packageserver id=NS1+7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:47.543028884Z time="2026-03-18T17:48:47Z" level=info msg="install strategy successful" csv=packageserver id=FzThr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:47.643743429Z time="2026-03-18T17:48:47Z" level=info msg="install strategy successful" csv=packageserver id=Glu7m namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:47.742768605Z time="2026-03-18T17:48:47Z" level=info msg="install strategy successful" csv=packageserver id=OKQFf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:47.846057802Z time="2026-03-18T17:48:47Z" level=info msg="install strategy successful" csv=packageserver id=Jt45N namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:47.956332514Z time="2026-03-18T17:48:47Z" level=info msg="install strategy successful" csv=packageserver id=roTAf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:48.053636143Z time="2026-03-18T17:48:48Z" level=info msg="install strategy successful" csv=packageserver id=kM72u namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:48.153316909Z time="2026-03-18T17:48:48Z" level=info msg="install strategy successful" csv=packageserver id=ejSEY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:48.239331951Z time="2026-03-18T17:48:48Z" level=info msg="install strategy successful" csv=packageserver id=pXBG1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:48.339209592Z time="2026-03-18T17:48:48Z" level=info msg="install strategy successful" csv=packageserver id=Qn75X namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:48.438052214Z time="2026-03-18T17:48:48Z" level=info msg="install strategy successful" csv=packageserver id=5kPRq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:48.539656644Z time="2026-03-18T17:48:48Z" level=info msg="install strategy successful" csv=packageserver id=SdBz0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:48.639972916Z time="2026-03-18T17:48:48Z" level=info msg="install strategy successful" csv=packageserver id=goDfY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:48.744106597Z time="2026-03-18T17:48:48Z" level=info msg="install strategy successful" csv=packageserver id=F2N/p namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:48.839507233Z time="2026-03-18T17:48:48Z" level=info msg="install strategy successful" csv=packageserver id=lzFLy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:48.941007559Z time="2026-03-18T17:48:48Z" level=info msg="install strategy successful" csv=packageserver id=JtDyu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:49.040657063Z time="2026-03-18T17:48:49Z" level=info msg="install strategy successful" csv=packageserver id=l40Bu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:49.141996246Z time="2026-03-18T17:48:49Z" level=info msg="install strategy successful" csv=packageserver id=r7V0/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:49.241401203Z time="2026-03-18T17:48:49Z" level=info msg="install strategy successful" csv=packageserver id=rTknN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:49.338314981Z time="2026-03-18T17:48:49Z" level=info msg="install strategy successful" csv=packageserver id=TZclm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:49.440262270Z time="2026-03-18T17:48:49Z" level=info msg="install strategy successful" csv=packageserver id=K763n namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:49.541077747Z time="2026-03-18T17:48:49Z" level=info msg="install strategy successful" csv=packageserver id=aSXpY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:49.640861406Z time="2026-03-18T17:48:49Z" level=info msg="install strategy successful" csv=packageserver id=dkPB3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.265608277Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=XJhdT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.363111730Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=6Q6aC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.413479013Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=9JFy4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.428032202Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=LM2iR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.514129786Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=qKe5x namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.524494227Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=Jhyho namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.534722454Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=yvt5D namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.543694455Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=VZmLl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.552297746Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=Eeiid namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.639124281Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=Lpx/g namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.738557029Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=D/cc/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.839178471Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=d55vX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:50.939796913Z time="2026-03-18T17:48:50Z" level=info msg="install strategy successful" csv=packageserver id=OFRPP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:51.040175848Z time="2026-03-18T17:48:51Z" level=info msg="install strategy successful" csv=packageserver id=AA+Tp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:51.138824835Z time="2026-03-18T17:48:51Z" level=info msg="install strategy successful" csv=packageserver id=H0CW6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:51.242448871Z time="2026-03-18T17:48:51Z" level=info msg="install strategy successful" csv=packageserver id=E/3sD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:51.337943739Z time="2026-03-18T17:48:51Z" level=info msg="install strategy successful" csv=packageserver id=HByhj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:51.438568381Z time="2026-03-18T17:48:51Z" level=info msg="install strategy successful" csv=packageserver id=KKt+j namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:51.539575213Z time="2026-03-18T17:48:51Z" level=info msg="install strategy successful" csv=packageserver id=kwA2b namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:51.638801836Z time="2026-03-18T17:48:51Z" level=info msg="install strategy successful" csv=packageserver id=va44n namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:51.740813107Z time="2026-03-18T17:48:51Z" level=info msg="install strategy successful" csv=packageserver id=Q/pKc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:51.839781443Z time="2026-03-18T17:48:51Z" level=info msg="install strategy successful" csv=packageserver id=pwN/R namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:51.938944224Z time="2026-03-18T17:48:51Z" level=info msg="install strategy successful" csv=packageserver id=kL6OD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:52.040429709Z time="2026-03-18T17:48:52Z" level=info msg="install strategy successful" csv=packageserver id=uNoDe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:52.401123745Z time="2026-03-18T17:48:52Z" level=info msg="install strategy successful" csv=packageserver id=zq4mH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:52.500610115Z time="2026-03-18T17:48:52Z" level=info msg="install strategy successful" csv=packageserver id=sqYlE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:52.751474150Z time="2026-03-18T17:48:52Z" level=info msg="install strategy successful" csv=packageserver id=WHEWs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:52.763773485Z time="2026-03-18T17:48:52Z" level=info msg="install strategy successful" csv=packageserver id=oP178 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:52.777137300Z time="2026-03-18T17:48:52Z" level=info msg="install strategy successful" csv=packageserver id=K5Kug namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:52.790619578Z time="2026-03-18T17:48:52Z" level=info msg="install strategy successful" csv=packageserver id=ZXKAj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:52.812648456Z time="2026-03-18T17:48:52Z" level=info msg="install strategy successful" csv=packageserver id=CdF2Z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:52.838266784Z time="2026-03-18T17:48:52Z" level=info msg="install strategy successful" csv=packageserver id=3IuP9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:52.939462122Z time="2026-03-18T17:48:52Z" level=info msg="install strategy successful" csv=packageserver id=bolHl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:53.045502776Z time="2026-03-18T17:48:53Z" level=info msg="install strategy successful" csv=packageserver id=vZHw3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:53.141002584Z time="2026-03-18T17:48:53Z" level=info msg="install strategy successful" csv=packageserver id=rKDtV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:53.240515675Z time="2026-03-18T17:48:53Z" level=info msg="install strategy successful" csv=packageserver id=HLZ6g namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:53.338683978Z time="2026-03-18T17:48:53Z" level=info msg="install strategy successful" csv=packageserver id=cjNdf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:53.438704693Z time="2026-03-18T17:48:53Z" level=info msg="install strategy successful" csv=packageserver id=d+WS2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:53.542594306Z time="2026-03-18T17:48:53Z" level=info msg="install strategy successful" csv=packageserver id=vu+MB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:53.639447473Z time="2026-03-18T17:48:53Z" level=info msg="install strategy successful" csv=packageserver id=YyIeE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:53.739934621Z time="2026-03-18T17:48:53Z" level=info msg="install strategy successful" csv=packageserver id=H8d0d namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:53.841543010Z time="2026-03-18T17:48:53Z" level=info msg="install strategy successful" csv=packageserver id=MzqZH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:53.938642533Z time="2026-03-18T17:48:53Z" level=info msg="install strategy successful" csv=packageserver id=BdU2j namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:54.039452201Z time="2026-03-18T17:48:54Z" level=info msg="install strategy successful" csv=packageserver id=eTije namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T17:48:54.139161316Z time="2026-03-18T17:48:54Z" level=info msg="install strategy successful" csv=packageserver id=iXEic namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000005670115156562607035100 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-68f85b4d6c-qpgfz2026-03-18T17:47:56.790336229Z time="2026-03-18T17:47:56Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=6OHZX 2026-03-18T17:47:56.790336229Z time="2026-03-18T17:47:56Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=6OHZX 2026-03-18T17:47:56.790336229Z time="2026-03-18T17:47:56Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=6OHZX 2026-03-18T17:47:56.790336229Z time="2026-03-18T17:47:56Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=6OHZX 2026-03-18T17:47:56.790336229Z time="2026-03-18T17:47:56Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=6OHZX 2026-03-18T17:47:57.378833501Z time="2026-03-18T17:47:57Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:57.378833501Z time="2026-03-18T17:47:57Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:57.385707203Z time="2026-03-18T17:47:57Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:57.385873229Z time="2026-03-18T17:47:57Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:57.385873229Z time="2026-03-18T17:47:57Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:57.385873229Z time="2026-03-18T17:47:57Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=XQb4t 2026-03-18T17:47:57.385873229Z time="2026-03-18T17:47:57Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:57.385901630Z time="2026-03-18T17:47:57Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:57.398309884Z time="2026-03-18T17:47:57Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:57.398435558Z time="2026-03-18T17:47:57Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:57.398435558Z time="2026-03-18T17:47:57Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:57.398556473Z time="2026-03-18T17:47:57Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:57.398556473Z time="2026-03-18T17:47:57Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XQb4t 2026-03-18T17:47:59.373855664Z time="2026-03-18T17:47:59Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:47:59.373855664Z time="2026-03-18T17:47:59Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:47:59.379900974Z time="2026-03-18T17:47:59Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:47:59.380045519Z time="2026-03-18T17:47:59Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:47:59.380045519Z time="2026-03-18T17:47:59Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:47:59.380069130Z time="2026-03-18T17:47:59Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=JPhmd 2026-03-18T17:47:59.380069130Z time="2026-03-18T17:47:59Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:47:59.380069130Z time="2026-03-18T17:47:59Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:47:59.391770507Z time="2026-03-18T17:47:59Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:47:59.391954664Z time="2026-03-18T17:47:59Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:47:59.391954664Z time="2026-03-18T17:47:59Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:47:59.392061678Z time="2026-03-18T17:47:59Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:47:59.392061678Z time="2026-03-18T17:47:59Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=JPhmd 2026-03-18T17:48:00.383301245Z time="2026-03-18T17:48:00Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:00.383301245Z time="2026-03-18T17:48:00Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:00.392689293Z time="2026-03-18T17:48:00Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:00.392944093Z time="2026-03-18T17:48:00Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:00.392961343Z time="2026-03-18T17:48:00Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:00.393025286Z time="2026-03-18T17:48:00Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=g6vwR 2026-03-18T17:48:00.393033786Z time="2026-03-18T17:48:00Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:00.393041456Z time="2026-03-18T17:48:00Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:00.405335134Z time="2026-03-18T17:48:00Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:00.405519991Z time="2026-03-18T17:48:00Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:00.405519991Z time="2026-03-18T17:48:00Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:00.405519991Z time="2026-03-18T17:48:00Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:00.405519991Z time="2026-03-18T17:48:00Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=g6vwR 2026-03-18T17:48:16.431330991Z time="2026-03-18T17:48:16Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.431330991Z time="2026-03-18T17:48:16Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.444068897Z time="2026-03-18T17:48:16Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.444068897Z time="2026-03-18T17:48:16Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.444068897Z time="2026-03-18T17:48:16Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.444068897Z time="2026-03-18T17:48:16Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=/qpoQ 2026-03-18T17:48:16.444068897Z time="2026-03-18T17:48:16Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.444068897Z time="2026-03-18T17:48:16Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.460155589Z time="2026-03-18T17:48:16Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.460155589Z time="2026-03-18T17:48:16Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.460155589Z time="2026-03-18T17:48:16Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.460155589Z time="2026-03-18T17:48:16Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.460155589Z time="2026-03-18T17:48:16Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=/qpoQ 2026-03-18T17:48:16.481971871Z time="2026-03-18T17:48:16Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:16.481971871Z time="2026-03-18T17:48:16Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:16.485233855Z time="2026-03-18T17:48:16Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:16.485442433Z time="2026-03-18T17:48:16Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:16.485442433Z time="2026-03-18T17:48:16Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:16.485465454Z time="2026-03-18T17:48:16Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=Rf9Mn 2026-03-18T17:48:16.485478824Z time="2026-03-18T17:48:16Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:16.485478824Z time="2026-03-18T17:48:16Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:16.499371414Z time="2026-03-18T17:48:16Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:16.499538420Z time="2026-03-18T17:48:16Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:16.499538420Z time="2026-03-18T17:48:16Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-bgdql current-pod.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:16.499736757Z time="2026-03-18T17:48:16Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:16.499736757Z time="2026-03-18T17:48:16Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Rf9Mn 2026-03-18T17:48:38.777853761Z time="2026-03-18T17:48:38Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=community-operators state.State=READY" 2026-03-18T17:48:38.777853761Z time="2026-03-18T17:48:38Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.777853761Z time="2026-03-18T17:48:38Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.777909833Z time="2026-03-18T17:48:38Z" level=info msg="resolving sources" id=L9b0f namespace=openshift-marketplace 2026-03-18T17:48:38.777909833Z time="2026-03-18T17:48:38Z" level=info msg="checking if subscriptions need update" id=L9b0f namespace=openshift-marketplace 2026-03-18T17:48:38.783456018Z time="2026-03-18T17:48:38Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=L9b0f namespace=openshift-marketplace 2026-03-18T17:48:38.785601609Z time="2026-03-18T17:48:38Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.785601609Z time="2026-03-18T17:48:38Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-8485d current-pod.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.785601609Z time="2026-03-18T17:48:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-8485d current-pod.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.785601609Z time="2026-03-18T17:48:38Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=Yux5M 2026-03-18T17:48:38.785601609Z time="2026-03-18T17:48:38Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.785601609Z time="2026-03-18T17:48:38Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.795803504Z time="2026-03-18T17:48:38Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.796007720Z time="2026-03-18T17:48:38Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-8485d current-pod.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.796038821Z time="2026-03-18T17:48:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-8485d current-pod.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.796145243Z time="2026-03-18T17:48:38Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.796174204Z time="2026-03-18T17:48:38Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=Yux5M 2026-03-18T17:48:38.807886504Z time="2026-03-18T17:48:38Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pbjUv 2026-03-18T17:48:38.807976036Z time="2026-03-18T17:48:38Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pbjUv 2026-03-18T17:48:38.814179840Z time="2026-03-18T17:48:38Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pbjUv 2026-03-18T17:48:38.814179840Z time="2026-03-18T17:48:38Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-8485d current-pod.namespace=openshift-marketplace id=pbjUv 2026-03-18T17:48:38.814179840Z time="2026-03-18T17:48:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-8485d current-pod.namespace=openshift-marketplace id=pbjUv 2026-03-18T17:48:38.814179840Z time="2026-03-18T17:48:38Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=pbjUv 2026-03-18T17:48:38.814179840Z time="2026-03-18T17:48:38Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pbjUv 2026-03-18T17:48:38.814179840Z time="2026-03-18T17:48:38Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pbjUv 2026-03-18T17:48:38.827308208Z time="2026-03-18T17:48:38Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pbjUv 2026-03-18T17:48:38.827470453Z time="2026-03-18T17:48:38Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-8485d current-pod.namespace=openshift-marketplace id=pbjUv 2026-03-18T17:48:38.827480583Z time="2026-03-18T17:48:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-8485d current-pod.namespace=openshift-marketplace id=pbjUv 2026-03-18T17:48:38.827666558Z time="2026-03-18T17:48:38Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pbjUv 2026-03-18T17:48:38.827687369Z time="2026-03-18T17:48:38Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=pbjUv config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-rws9x/etcd-operator_current.log0000640000000000000000000001055315156562607031354 0ustar00000000000000002026-03-18T17:47:41.093808428Z I0318 17:47:41.092703 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:47:41.093808428Z I0318 17:47:41.092810 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:47:41.098372051Z I0318 17:47:41.095157 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-18T17:47:41.098372051Z I0318 17:47:41.095761 1 observer_polling.go:159] Starting file observer 2026-03-18T17:47:41.098372051Z I0318 17:47:41.096171 1 observer_polling.go:159] Starting file observer 2026-03-18T17:47:41.122309723Z I0318 17:47:41.121414 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602261953.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-18T17:48:05.211099830Z I0318 17:48:05.211030 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T17:48:05.211099830Z W0318 17:48:05.211062 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:05.211099830Z W0318 17:48:05.211067 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:05.211099830Z W0318 17:48:05.211071 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T17:48:05.211099830Z W0318 17:48:05.211074 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T17:48:05.211099830Z W0318 17:48:05.211078 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T17:48:05.211099830Z W0318 17:48:05.211081 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T17:48:05.220541009Z I0318 17:48:05.220032 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T17:48:05.220541009Z I0318 17:48:05.220333 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-03-18T17:48:05.237353620Z I0318 17:48:05.237254 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T17:48:05.237353620Z I0318 17:48:05.237324 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T17:48:05.238706222Z I0318 17:48:05.237373 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T17:48:05.238706222Z I0318 17:48:05.237410 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T17:48:05.238706222Z I0318 17:48:05.237447 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T17:48:05.238706222Z I0318 17:48:05.237460 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:05.238706222Z I0318 17:48:05.238396 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T17:48:05.238706222Z I0318 17:48:05.238428 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T17:48:05.238706222Z I0318 17:48:05.238543 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T17:48:05.341946845Z I0318 17:48:05.338656 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:05.341946845Z I0318 17:48:05.338734 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T17:48:05.341946845Z I0318 17:48:05.338850 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-rws9x/etcd-operator_previous.log0000640000000000000000000000301615156562607031542 0ustar00000000000000002026-03-18T17:45:42.725543183Z I0318 17:45:42.724113 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-18T17:45:42.725543183Z I0318 17:45:42.724530 1 observer_polling.go:159] Starting file observer 2026-03-18T17:45:42.725543183Z I0318 17:45:42.724915 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:45:42.725543183Z I0318 17:45:42.724969 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:45:42.726722292Z I0318 17:45:42.726658 1 observer_polling.go:159] Starting file observer 2026-03-18T17:46:42.734572396Z W0318 17:46:42.734495 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods etcd-operator-8544cbcf9c-rws9x) 2026-03-18T17:46:42.734741171Z I0318 17:46:42.734709 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602261953.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-18T17:47:12.950489113Z F0318 17:47:12.949943 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock": context deadline exceeded config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-rws9x.json0000640000000000000000000002043615156562607024267 0ustar0000000000000000{"metadata":{"name":"etcd-operator-8544cbcf9c-rws9x","generateName":"etcd-operator-8544cbcf9c-","namespace":"openshift-etcd-operator","uid":"0100a259-1358-45e8-8191-4e1f9a14ec89","resourceVersion":"9145","creationTimestamp":"2026-03-18T17:40:17Z","labels":{"app":"etcd-operator","pod-template-hash":"8544cbcf9c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-8544cbcf9c","uid":"b3f62035-f0a3-4657-924e-0781c1cf7c86","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-tnknt","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-tnknt","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-18T17:47:40Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 17:45:42.724113 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/\nI0318 17:45:42.724530 1 observer_polling.go:159] Starting file observer\nI0318 17:45:42.724915 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 17:45:42.724969 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 17:45:42.726658 1 observer_polling.go:159] Starting file observer\nW0318 17:46:42.734495 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods etcd-operator-8544cbcf9c-rws9x)\nI0318 17:46:42.734709 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602261953.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934\nF0318 17:47:12.949943 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-18T17:45:42Z","finishedAt":"2026-03-18T17:47:12Z","containerID":"cri-o://8df0fa7291cab5e340fb319c595e0406033737475f352f9d19dfc2dafb7b328f"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","containerID":"cri-o://1bb2dec1f59aff9832355c134a19ba762af95a3f61ff179296debc28c40ca05c","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-tnknt","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002746115156562607033764 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-897b458c6-vsss92026-03-18T17:42:31.844867102Z W0318 17:42:31.844662 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-18T17:42:31.848430661Z I0318 17:42:31.845133 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773855751 cert, and key in /tmp/serving-cert-3438343879/serving-signer.crt, /tmp/serving-cert-3438343879/serving-signer.key 2026-03-18T17:42:32.313031186Z I0318 17:42:32.312920 1 observer_polling.go:159] Starting file observer 2026-03-18T17:42:32.336362920Z I0318 17:42:32.336262 1 builder.go:304] check-endpoints version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-18T17:42:32.337809732Z I0318 17:42:32.337774 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-3438343879/tls.crt::/tmp/serving-cert-3438343879/tls.key" 2026-03-18T17:42:32.735114396Z I0318 17:42:32.735046 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-18T17:42:32.741007066Z I0318 17:42:32.740963 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-18T17:42:32.741007066Z I0318 17:42:32.740991 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-18T17:42:32.741040306Z I0318 17:42:32.741024 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-18T17:42:32.741040306Z I0318 17:42:32.741031 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-18T17:42:32.745521305Z I0318 17:42:32.745470 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T17:42:32.745521305Z W0318 17:42:32.745515 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:42:32.745548296Z W0318 17:42:32.745522 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:42:32.745548296Z W0318 17:42:32.745529 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T17:42:32.745548296Z W0318 17:42:32.745534 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T17:42:32.745548296Z W0318 17:42:32.745538 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T17:42:32.745548296Z W0318 17:42:32.745541 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T17:42:32.745605437Z I0318 17:42:32.745481 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-18T17:42:32.749388880Z I0318 17:42:32.749353 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T17:42:32.749434421Z I0318 17:42:32.749415 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T17:42:32.749493312Z I0318 17:42:32.749464 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T17:42:32.749501343Z I0318 17:42:32.749490 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T17:42:32.749538003Z I0318 17:42:32.749511 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T17:42:32.749538003Z I0318 17:42:32.749527 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:42:32.749684307Z I0318 17:42:32.749664 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T17:42:32.749684307Z I0318 17:42:32.749678 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T17:42:32.749811889Z I0318 17:42:32.749784 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3438343879/tls.crt::/tmp/serving-cert-3438343879/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773855751\" (2026-03-18 17:42:31 +0000 UTC to 2026-04-17 17:42:32 +0000 UTC (now=2026-03-18 17:42:32.749718047 +0000 UTC))" 2026-03-18T17:42:32.749991293Z I0318 17:42:32.749972 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773855752\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773855752\" (2026-03-18 16:42:32 +0000 UTC to 2027-03-18 16:42:32 +0000 UTC (now=2026-03-18 17:42:32.749920952 +0000 UTC))" 2026-03-18T17:42:32.750048664Z I0318 17:42:32.750030 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-18T17:42:32.750081965Z I0318 17:42:32.750061 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-18T17:42:32.750121776Z I0318 17:42:32.750092 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3438343879/tls.crt::/tmp/serving-cert-3438343879/tls.key" 2026-03-18T17:42:32.750247199Z I0318 17:42:32.750226 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T17:42:32.750909714Z I0318 17:42:32.750871 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-18T17:42:32.751876775Z I0318 17:42:32.751829 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:42:32.752381636Z I0318 17:42:32.752348 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:42:32.752812945Z I0318 17:42:32.752786 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:42:32.850349672Z I0318 17:42:32.849536 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T17:42:32.850349672Z I0318 17:42:32.849925 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:42:32.850349672Z I0318 17:42:32.849980 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T17:42:32.850349672Z I0318 17:42:32.850189 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 17:31:45 +0000 UTC to 2026-03-19 17:31:45 +0000 UTC (now=2026-03-18 17:42:32.850148108 +0000 UTC))" 2026-03-18T17:42:32.854315660Z I0318 17:42:32.850397 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3438343879/tls.crt::/tmp/serving-cert-3438343879/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773855751\" (2026-03-18 17:42:31 +0000 UTC to 2026-04-17 17:42:32 +0000 UTC (now=2026-03-18 17:42:32.850374303 +0000 UTC))" 2026-03-18T17:42:32.854315660Z I0318 17:42:32.850540 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773855752\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773855752\" (2026-03-18 16:42:32 +0000 UTC to 2027-03-18 16:42:32 +0000 UTC (now=2026-03-18 17:42:32.850523586 +0000 UTC))" 2026-03-18T17:42:32.854315660Z I0318 17:42:32.850820 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 17:25:06 +0000 UTC to 2036-03-15 17:25:06 +0000 UTC (now=2026-03-18 17:42:32.850801482 +0000 UTC))" 2026-03-18T17:42:32.854315660Z I0318 17:42:32.850844 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 17:31:47 +0000 UTC to 2026-03-19 17:31:47 +0000 UTC (now=2026-03-18 17:42:32.850829853 +0000 UTC))" 2026-03-18T17:42:32.854315660Z I0318 17:42:32.850863 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 17:31:47 +0000 UTC to 2027-03-18 17:31:47 +0000 UTC (now=2026-03-18 17:42:32.850850633 +0000 UTC))" 2026-03-18T17:42:32.854315660Z I0318 17:42:32.850885 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 17:31:47 +0000 UTC to 2027-03-18 17:31:47 +0000 UTC (now=2026-03-18 17:42:32.850871974 +0000 UTC))" 2026-03-18T17:42:32.854315660Z I0318 17:42:32.850904 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 17:31:45 +0000 UTC to 2036-03-15 17:31:45 +0000 UTC (now=2026-03-18 17:42:32.850891724 +0000 UTC))" 2026-03-18T17:42:32.854315660Z I0318 17:42:32.850922 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 17:31:45 +0000 UTC to 2026-03-19 17:31:45 +0000 UTC (now=2026-03-18 17:42:32.850911174 +0000 UTC))" 2026-03-18T17:42:32.854315660Z I0318 17:42:32.851067 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3438343879/tls.crt::/tmp/serving-cert-3438343879/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773855751\" (2026-03-18 17:42:31 +0000 UTC to 2026-04-17 17:42:32 +0000 UTC (now=2026-03-18 17:42:32.851051387 +0000 UTC))" 2026-03-18T17:42:32.854315660Z I0318 17:42:32.851194 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773855752\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773855752\" (2026-03-18 16:42:32 +0000 UTC to 2027-03-18 16:42:32 +0000 UTC (now=2026-03-18 17:42:32.85117865 +0000 UTC))" 2026-03-18T17:42:33.121043660Z I0318 17:42:33.120666 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:42:33.151219045Z I0318 17:42:33.151133 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-18T17:42:33.151219045Z I0318 17:42:33.151168 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-897b458c6-vsss9/openshift-apiserver_current.log0000640000000000000000000011450315156562607030761 0ustar00000000000000002026-03-18T17:47:59.246875716Z E0318 17:47:59.246792 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:59.247693247Z E0318 17:47:59.247650 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:59.247832492Z E0318 17:47:59.247789 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:59.247950666Z E0318 17:47:59.247906 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:59.248471356Z E0318 17:47:59.248429 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.408422988Z E0318 17:48:25.408338 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.408531693Z E0318 17:48:25.408474 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.408850245Z E0318 17:48:25.408815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.408992630Z E0318 17:48:25.408944 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.409462618Z E0318 17:48:25.409428 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.409856003Z E0318 17:48:25.409824 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.410214137Z E0318 17:48:25.410182 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.420180067Z E0318 17:48:25.410559 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.420675765Z E0318 17:48:25.411484 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.421073850Z E0318 17:48:25.411599 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.421479856Z E0318 17:48:25.412191 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.421823309Z E0318 17:48:25.412359 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422054327Z E0318 17:48:25.412982 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422313917Z E0318 17:48:25.413139 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422403151Z E0318 17:48:25.422360 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422403151Z E0318 17:48:25.422376 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422501725Z E0318 17:48:25.422453 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422552237Z E0318 17:48:25.422511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422677622Z E0318 17:48:25.422630 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422697173Z E0318 17:48:25.422676 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422713073Z E0318 17:48:25.422689 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422963353Z E0318 17:48:25.422519 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422963353Z E0318 17:48:25.422946 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.422992544Z E0318 17:48:25.415459 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.423104458Z E0318 17:48:25.422331 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.431640 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.431805 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.432215 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.432360 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.432590 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.432869 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.432928 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.433081 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.438071 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.438390 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.438655 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.438890 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440056214Z E0318 17:48:25.439036 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440127107Z E0318 17:48:25.440094 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440127107Z E0318 17:48:25.440105 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440516781Z E0318 17:48:25.440480 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.440803322Z E0318 17:48:25.440764 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.441029411Z E0318 17:48:25.440964 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.441082853Z E0318 17:48:25.441048 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.441152745Z E0318 17:48:25.441107 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:27.688169012Z E0318 17:48:27.688084 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:27.688237393Z E0318 17:48:27.688198 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:27.688237393Z E0318 17:48:27.688084 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:27.688338286Z E0318 17:48:27.688258 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:27.688735727Z E0318 17:48:27.688650 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.004826742Z E0318 17:48:28.004709 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.004826742Z E0318 17:48:28.004783 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.004928355Z E0318 17:48:28.004709 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.005024137Z E0318 17:48:28.004960 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.005024137Z E0318 17:48:28.004710 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.399932152Z E0318 17:48:28.399844 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.399932152Z E0318 17:48:28.399913 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.400036655Z E0318 17:48:28.399850 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.400110977Z E0318 17:48:28.400002 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.400291852Z E0318 17:48:28.400241 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.772765228Z E0318 17:48:28.772689 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.772765228Z E0318 17:48:28.772697 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.772904522Z E0318 17:48:28.772689 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.773005085Z E0318 17:48:28.772694 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.773147839Z E0318 17:48:28.772694 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.794177679Z E0318 17:48:28.794119 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.800896527Z E0318 17:48:28.799450 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.800896527Z E0318 17:48:28.799677 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.800896527Z E0318 17:48:28.799699 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.800896527Z E0318 17:48:28.799854 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.800896527Z E0318 17:48:28.800079 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.800896527Z E0318 17:48:28.800137 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.800896527Z E0318 17:48:28.800137 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.800896527Z E0318 17:48:28.800208 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.800977420Z E0318 17:48:28.800959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.807109142Z E0318 17:48:28.807078 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.807174283Z E0318 17:48:28.807154 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.807300887Z E0318 17:48:28.807084 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.807359419Z E0318 17:48:28.807329 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.807359419Z E0318 17:48:28.807152 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.860936851Z E0318 17:48:28.860857 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.861479166Z E0318 17:48:28.861429 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.861574369Z E0318 17:48:28.861529 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.861587379Z E0318 17:48:28.861561 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:28.861646971Z E0318 17:48:28.861630 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:29.257597845Z E0318 17:48:29.257521 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:29.257791430Z E0318 17:48:29.257771 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:29.258096279Z E0318 17:48:29.258081 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:29.258252743Z E0318 17:48:29.258238 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:29.258438368Z E0318 17:48:29.258423 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:37.757796525Z I0318 17:48:37.757699 1 policy_source.go:224] refreshing policies 2026-03-18T17:48:40.771054998Z I0318 17:48:40.770091 1 policy_source.go:224] refreshing policies 2026-03-18T17:48:41.770939219Z I0318 17:48:41.770792 1 policy_source.go:224] refreshing policies 2026-03-18T17:48:41.816374014Z I0318 17:48:41.816234 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-18T17:48:41.818709329Z I0318 17:48:41.818649 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 openshift-apiserver-operator_current.log0000640000000000000000000001001315156562607037700 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-t266j2026-03-18T17:47:24.515507799Z I0318 17:47:24.515201 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:47:24.515507799Z I0318 17:47:24.515459 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:47:24.516542798Z I0318 17:47:24.516493 1 observer_polling.go:159] Starting file observer 2026-03-18T17:47:40.402447386Z I0318 17:47:40.402354 1 builder.go:304] openshift-apiserver-operator version - 2026-03-18T17:48:05.197748101Z I0318 17:48:05.197567 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T17:48:05.197748101Z W0318 17:48:05.197648 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:05.197748101Z W0318 17:48:05.197654 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:05.197748101Z W0318 17:48:05.197658 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T17:48:05.197748101Z W0318 17:48:05.197662 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T17:48:05.197748101Z W0318 17:48:05.197666 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T17:48:05.197748101Z W0318 17:48:05.197670 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T17:48:05.201643009Z I0318 17:48:05.201205 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T17:48:05.202069896Z I0318 17:48:05.202038 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... 2026-03-18T17:48:05.222987822Z I0318 17:48:05.222119 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T17:48:05.222987822Z I0318 17:48:05.222178 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T17:48:05.222987822Z I0318 17:48:05.222208 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T17:48:05.222987822Z I0318 17:48:05.222248 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T17:48:05.222987822Z I0318 17:48:05.222389 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T17:48:05.222987822Z I0318 17:48:05.222510 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T17:48:05.222987822Z I0318 17:48:05.222517 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T17:48:05.222987822Z I0318 17:48:05.222532 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T17:48:05.222987822Z I0318 17:48:05.222537 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:05.327343298Z I0318 17:48:05.324719 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:05.327343298Z I0318 17:48:05.324828 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T17:48:05.327343298Z I0318 17:48:05.324924 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file openshift-apiserver-operator_previous.log0000640000000000000000000000221715156562607040101 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-t266j2026-03-18T17:44:34.515373577Z I0318 17:44:34.515141 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:44:34.515621243Z I0318 17:44:34.515581 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:44:34.516607317Z I0318 17:44:34.516554 1 observer_polling.go:159] Starting file observer 2026-03-18T17:45:34.527495036Z W0318 17:45:34.527377 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods) 2026-03-18T17:45:34.527564807Z I0318 17:45:34.527541 1 builder.go:304] openshift-apiserver-operator version - 2026-03-18T17:46:04.867365438Z F0318 17:46:04.866686 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock": context deadline exceeded config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-t266j.json0000640000000000000000000001637115156562607027630 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-d65958b8-t266j","generateName":"openshift-apiserver-operator-d65958b8-","namespace":"openshift-apiserver-operator","uid":"0b9ff55a-73fb-473f-b406-1f8b6cffdb89","resourceVersion":"9136","creationTimestamp":"2026-03-18T17:40:17Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"d65958b8"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-d65958b8","uid":"46adb38c-e2b5-4046-8f59-8d410c4a5c00","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-2tvgq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-2tvgq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-18T17:47:24Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 17:44:34.515141 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 17:44:34.515581 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 17:44:34.516554 1 observer_polling.go:159] Starting file observer\nW0318 17:45:34.527377 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0318 17:45:34.527541 1 builder.go:304] openshift-apiserver-operator version -\nF0318 17:46:04.866686 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-18T17:44:34Z","finishedAt":"2026-03-18T17:46:04Z","containerID":"cri-o://36a5d9d231da98f0f9e0dae16fa8c5d4e171fd401ed1a351ab236e19bff04107"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","containerID":"cri-o://208f151f73d2054e8fc1e7bad5a7840184b6f1a99cd1c642769a09479cee5ec9","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-2tvgq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515156562607043050 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-wlfj42026-03-18T17:47:24.578881624Z I0318 17:47:24.578750 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:47:24.579042300Z I0318 17:47:24.579010 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:47:24.579512187Z I0318 17:47:24.579450 1 observer_polling.go:159] Starting file observer 2026-03-18T17:47:40.392457745Z I0318 17:47:40.391737 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202603040208.p2.g4e99db6.assembly.stream.el9-4e99db6-4e99db62cea1d2ca48765230c6f5663d1f2c2702 2026-03-18T17:48:05.184387351Z I0318 17:48:05.182888 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T17:48:05.184387351Z W0318 17:48:05.182919 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:05.184387351Z W0318 17:48:05.182925 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:05.184387351Z W0318 17:48:05.182932 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T17:48:05.184387351Z W0318 17:48:05.182935 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T17:48:05.184387351Z W0318 17:48:05.182939 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T17:48:05.184387351Z W0318 17:48:05.182943 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T17:48:05.191867477Z I0318 17:48:05.188292 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T17:48:05.191867477Z I0318 17:48:05.188327 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T17:48:05.191867477Z I0318 17:48:05.188367 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T17:48:05.191867477Z I0318 17:48:05.188378 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T17:48:05.191867477Z I0318 17:48:05.188400 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T17:48:05.191867477Z I0318 17:48:05.188405 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:05.191867477Z I0318 17:48:05.191527 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T17:48:05.191867477Z I0318 17:48:05.191602 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T17:48:05.191867477Z I0318 17:48:05.191798 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T17:48:05.193503860Z I0318 17:48:05.193468 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T17:48:05.196018434Z I0318 17:48:05.194054 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-03-18T17:48:05.290489344Z I0318 17:48:05.290078 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:05.290489344Z I0318 17:48:05.290166 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T17:48:05.290489344Z I0318 17:48:05.290305 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-scheduler-operator-container_previous.log0000640000000000000000000000250315156562607043243 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-wlfj42026-03-18T17:45:42.704265628Z I0318 17:45:42.704066 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:45:42.704536965Z I0318 17:45:42.704507 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:45:42.705113559Z I0318 17:45:42.705064 1 observer_polling.go:159] Starting file observer 2026-03-18T17:46:42.713492639Z W0318 17:46:42.713392 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-operator-dddff6458-wlfj4) 2026-03-18T17:46:42.713728456Z I0318 17:46:42.713693 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202603040208.p2.g4e99db6.assembly.stream.el9-4e99db6-4e99db62cea1d2ca48765230c6f5663d1f2c2702 2026-03-18T17:47:13.084329123Z F0318 17:47:13.084194 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock": context deadline exceeded config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-wlfj4.json0000640000000000000000000001610715156562607032104 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-dddff6458-wlfj4","generateName":"openshift-kube-scheduler-operator-dddff6458-","namespace":"openshift-kube-scheduler-operator","uid":"3a3a6c2c-78e7-41f3-acff-20173cbc012a","resourceVersion":"9127","creationTimestamp":"2026-03-18T17:40:18Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"dddff6458"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.24/23\"],\"mac_address\":\"0a:58:0a:80:00:18\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.24/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.24\"\n ],\n \"mac\": \"0a:58:0a:80:00:18\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-dddff6458","uid":"fd0ae172-e148-47ce-b2e7-595a6469f444","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.24","podIPs":[{"ip":"10.128.0.24"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-18T17:47:24Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 17:45:42.704066 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 17:45:42.704507 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 17:45:42.705064 1 observer_polling.go:159] Starting file observer\nW0318 17:46:42.713392 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-kube-scheduler-operator-dddff6458-wlfj4)\nI0318 17:46:42.713693 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202603040208.p2.g4e99db6.assembly.stream.el9-4e99db6-4e99db62cea1d2ca48765230c6f5663d1f2c2702\nF0318 17:47:13.084194 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-18T17:45:42Z","finishedAt":"2026-03-18T17:47:13Z","containerID":"cri-o://34db6c58d1d15ad2f0f08eec2a02536e2b02dd1b1c722e12e770c383ca33f635"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","containerID":"cri-o://668ffd9218f263f73d241599acfd6811f0e9302607d1e13913220907ac048330","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-3-master-0/installer_current.log0000640000000000000000000001513615156562607027202 0ustar00000000000000002026-03-18T17:42:43.438387574Z I0318 17:42:43.437103 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc0004a7ea0 cert-secrets:0xc0004a7c20 configmaps:0xc0004a77c0 namespace:0xc0004a75e0 optional-configmaps:0xc0004a7900 optional-secrets:0xc0004a7860 pod:0xc0004a7680 pod-manifest-dir:0xc0004a7a40 resource-dir:0xc0004a79a0 revision:0xc0004a7540 secrets:0xc0004a7720 v:0xc0007092c0] [0xc0007092c0 0xc0004a7540 0xc0004a75e0 0xc0004a7680 0xc0004a79a0 0xc0004a7a40 0xc0004a77c0 0xc0004a7900 0xc0004a7860 0xc0004a7720 0xc0004a7ea0 0xc0004a7c20] [] map[cert-configmaps:0xc0004a7cc0 cert-dir:0xc0004a7ea0 cert-secrets:0xc0004a7c20 configmaps:0xc0004a77c0 help:0xc000709680 kubeconfig:0xc0004a74a0 log-flush-frequency:0xc000709220 namespace:0xc0004a75e0 optional-cert-configmaps:0xc0004a7e00 optional-cert-secrets:0xc0004a7d60 optional-configmaps:0xc0004a7900 optional-secrets:0xc0004a7860 pod:0xc0004a7680 pod-manifest-dir:0xc0004a7a40 pod-manifests-lock-file:0xc0004a7b80 resource-dir:0xc0004a79a0 revision:0xc0004a7540 secrets:0xc0004a7720 timeout-duration:0xc0004a7ae0 v:0xc0007092c0 vmodule:0xc000709360] [0xc0004a74a0 0xc0004a7540 0xc0004a75e0 0xc0004a7680 0xc0004a7720 0xc0004a77c0 0xc0004a7860 0xc0004a7900 0xc0004a79a0 0xc0004a7a40 0xc0004a7ae0 0xc0004a7b80 0xc0004a7c20 0xc0004a7cc0 0xc0004a7d60 0xc0004a7e00 0xc0004a7ea0 0xc000709220 0xc0007092c0 0xc000709360 0xc000709680] [0xc0004a7cc0 0xc0004a7ea0 0xc0004a7c20 0xc0004a77c0 0xc000709680 0xc0004a74a0 0xc000709220 0xc0004a75e0 0xc0004a7e00 0xc0004a7d60 0xc0004a7900 0xc0004a7860 0xc0004a7680 0xc0004a7a40 0xc0004a7b80 0xc0004a79a0 0xc0004a7540 0xc0004a7720 0xc0004a7ae0 0xc0007092c0 0xc000709360] map[104:0xc000709680 118:0xc0007092c0] [] -1 0 0xc000a55bc0 true 0x223dac0 []} 2026-03-18T17:42:43.438387574Z I0318 17:42:43.437385 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00099aea0)({ 2026-03-18T17:42:43.438387574Z KubeConfig: (string) "", 2026-03-18T17:42:43.438387574Z KubeClient: (kubernetes.Interface) , 2026-03-18T17:42:43.438387574Z Revision: (string) (len=1) "3", 2026-03-18T17:42:43.438387574Z NodeName: (string) "", 2026-03-18T17:42:43.438387574Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-18T17:42:43.438387574Z Clock: (clock.RealClock) { 2026-03-18T17:42:43.438387574Z }, 2026-03-18T17:42:43.438387574Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-18T17:42:43.438387574Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T17:42:43.438387574Z (string) (len=31) "localhost-recovery-client-token" 2026-03-18T17:42:43.438387574Z }, 2026-03-18T17:42:43.438387574Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T17:42:43.438387574Z (string) (len=12) "serving-cert" 2026-03-18T17:42:43.438387574Z }, 2026-03-18T17:42:43.438387574Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-18T17:42:43.438387574Z (string) (len=18) "kube-scheduler-pod", 2026-03-18T17:42:43.438387574Z (string) (len=6) "config", 2026-03-18T17:42:43.438387574Z (string) (len=17) "serviceaccount-ca", 2026-03-18T17:42:43.438387574Z (string) (len=20) "scheduler-kubeconfig", 2026-03-18T17:42:43.438387574Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-18T17:42:43.438387574Z }, 2026-03-18T17:42:43.438387574Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T17:42:43.438387574Z (string) (len=16) "policy-configmap" 2026-03-18T17:42:43.438387574Z }, 2026-03-18T17:42:43.438387574Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-18T17:42:43.438387574Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-18T17:42:43.438387574Z }, 2026-03-18T17:42:43.438387574Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-18T17:42:43.438387574Z CertConfigMapNamePrefixes: ([]string) , 2026-03-18T17:42:43.438387574Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-18T17:42:43.438387574Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-18T17:42:43.438387574Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T17:42:43.438387574Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T17:42:43.438387574Z Timeout: (time.Duration) 2m0s, 2026-03-18T17:42:43.438387574Z StaticPodManifestsLockFile: (string) "", 2026-03-18T17:42:43.438387574Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T17:42:43.438387574Z KubeletVersion: (string) "" 2026-03-18T17:42:43.438387574Z }) 2026-03-18T17:42:43.438387574Z I0318 17:42:43.438245 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T17:42:43.488341644Z I0318 17:42:43.481852 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T17:42:43.488341644Z I0318 17:42:43.482088 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T17:42:43.488341644Z I0318 17:42:43.482103 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T17:42:43.514351836Z I0318 17:42:43.511845 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-18T17:42:53.515785508Z I0318 17:42:53.515719 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-18T17:43:17.516989190Z W0318 17:43:17.516795 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:43:37.514166228Z W0318 17:43:37.513985 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:43:57.513510481Z W0318 17:43:57.513387 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:44:11.513969734Z W0318 17:44:11.513865 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:44:11.513969734Z F0318 17:44:11.513923 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-scheduler/installer-3-master-0.json0000640000000000000000000001632515156562607022670 0ustar0000000000000000{"metadata":{"name":"installer-3-master-0","namespace":"openshift-kube-scheduler","uid":"1a709ef9-91c0-4193-acb4-0594d02f554c","resourceVersion":"9133","creationTimestamp":"2026-03-18T17:42:36Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.50/23\"],\"mac_address\":\"0a:58:0a:80:00:32\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.50/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.50\"\n ],\n \"mac\": \"0a:58:0a:80:00:32\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-3","uid":"5f25092d-7379-4407-b78a-b5b17fc30c7a"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=3","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:45:43Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:36Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:45:42Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:45:42Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.50","podIPs":[{"ip":"10.128.0.50"}],"startTime":"2026-03-18T17:42:36Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0318 17:42:43.438245 1 cmd.go:413] Getting controller reference for node master-0\nI0318 17:42:43.481852 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0318 17:42:43.482088 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0318 17:42:43.482103 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0318 17:42:43.511845 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0318 17:42:53.515719 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0318 17:43:17.516795 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0318 17:43:37.513985 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0318 17:43:57.513387 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0318 17:44:11.513865 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0318 17:44:11.513923 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-03-18T17:42:42Z","finishedAt":"2026-03-18T17:44:11Z","containerID":"cri-o://484988d6e1e2aeba58f6749a644020e240b6e9ebd0d813d191a1e837c5837362"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","containerID":"cri-o://484988d6e1e2aeba58f6749a644020e240b6e9ebd0d813d191a1e837c5837362","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000005513015156562607030236 0ustar00000000000000002026-03-18T17:44:13.530121489Z - name: ImageLocality 2026-03-18T17:44:13.530121489Z weight: 1 2026-03-18T17:44:13.530121489Z - name: DefaultBinder 2026-03-18T17:44:13.530121489Z weight: 0 2026-03-18T17:44:13.530121489Z permit: {} 2026-03-18T17:44:13.530121489Z postBind: {} 2026-03-18T17:44:13.530121489Z postFilter: {} 2026-03-18T17:44:13.530121489Z preBind: {} 2026-03-18T17:44:13.530121489Z preEnqueue: {} 2026-03-18T17:44:13.530121489Z preFilter: {} 2026-03-18T17:44:13.530121489Z preScore: {} 2026-03-18T17:44:13.530121489Z queueSort: {} 2026-03-18T17:44:13.530121489Z reserve: {} 2026-03-18T17:44:13.530121489Z score: {} 2026-03-18T17:44:13.530121489Z schedulerName: default-scheduler 2026-03-18T17:44:13.530121489Z > 2026-03-18T17:44:13.533059740Z I0318 17:44:13.532989 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-18T17:44:13.533059740Z I0318 17:44:13.533028 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-18T17:44:13.536854521Z I0318 17:44:13.536788 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T17:44:13.537546928Z I0318 17:44:13.537305 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T17:44:13.538251885Z I0318 17:44:13.538170 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-18T17:44:13.538482141Z I0318 17:44:13.538389 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773855793\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773855793\" (2026-03-18 16:43:12 +0000 UTC to 2027-03-18 16:43:12 +0000 UTC (now=2026-03-18 17:44:13.538319936 +0000 UTC))" 2026-03-18T17:44:13.538972513Z I0318 17:44:13.538829 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773855793\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773855793\" (2026-03-18 16:43:13 +0000 UTC to 2029-03-18 16:43:13 +0000 UTC (now=2026-03-18 17:44:13.538798359 +0000 UTC))" 2026-03-18T17:44:13.538972513Z I0318 17:44:13.538961 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-18T17:44:13.539188078Z I0318 17:44:13.539120 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T17:44:13.544368174Z I0318 17:44:13.542574 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-18T17:44:13.544368174Z I0318 17:44:13.543261 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.544368174Z I0318 17:44:13.543324 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.544368174Z I0318 17:44:13.543533 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.548375200Z I0318 17:44:13.547374 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.548375200Z I0318 17:44:13.547668 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.548375200Z I0318 17:44:13.547895 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.550427350Z I0318 17:44:13.548773 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.550427350Z I0318 17:44:13.548801 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.550427350Z I0318 17:44:13.549568 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.550427350Z I0318 17:44:13.549628 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.550427350Z I0318 17:44:13.549799 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-18T17:44:13.550866411Z I0318 17:44:13.550779 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.559810977Z I0318 17:44:13.559678 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.559865558Z I0318 17:44:13.559765 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.573725203Z I0318 17:44:13.573622 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.579341809Z I0318 17:44:13.579242 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-18T17:44:13.638255435Z I0318 17:44:13.638148 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T17:44:13.639050534Z I0318 17:44:13.638953 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 17:25:06 +0000 UTC to 2036-03-15 17:25:06 +0000 UTC (now=2026-03-18 17:44:13.638915581 +0000 UTC))" 2026-03-18T17:44:13.639050534Z I0318 17:44:13.639019 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 17:31:47 +0000 UTC to 2026-03-19 17:31:47 +0000 UTC (now=2026-03-18 17:44:13.639007763 +0000 UTC))" 2026-03-18T17:44:13.639079125Z I0318 17:44:13.639054 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 17:31:47 +0000 UTC to 2027-03-18 17:31:47 +0000 UTC (now=2026-03-18 17:44:13.639043854 +0000 UTC))" 2026-03-18T17:44:13.639098965Z I0318 17:44:13.639080 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 17:31:47 +0000 UTC to 2027-03-18 17:31:47 +0000 UTC (now=2026-03-18 17:44:13.639070714 +0000 UTC))" 2026-03-18T17:44:13.639147476Z I0318 17:44:13.639106 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 17:31:45 +0000 UTC to 2036-03-15 17:31:45 +0000 UTC (now=2026-03-18 17:44:13.639096555 +0000 UTC))" 2026-03-18T17:44:13.639500566Z I0318 17:44:13.639433 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773855793\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773855793\" (2026-03-18 16:43:12 +0000 UTC to 2027-03-18 16:43:12 +0000 UTC (now=2026-03-18 17:44:13.639413413 +0000 UTC))" 2026-03-18T17:44:13.639737301Z I0318 17:44:13.639699 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773855793\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773855793\" (2026-03-18 16:43:13 +0000 UTC to 2029-03-18 16:43:13 +0000 UTC (now=2026-03-18 17:44:13.63968367 +0000 UTC))" 2026-03-18T17:44:13.639755952Z I0318 17:44:13.639736 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-18T17:44:18.641149210Z E0318 17:44:18.641006 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:44:26.660450062Z E0318 17:44:26.660237 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:44:33.847668300Z E0318 17:44:33.847559 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:44:41.757344811Z E0318 17:44:41.757178 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:44:49.289994718Z E0318 17:44:49.289908 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:44:58.118101170Z E0318 17:44:58.117965 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:45:06.419781145Z E0318 17:45:06.419583 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-18T17:45:14.012415264Z E0318 17:45:14.012269 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:45:22.234025392Z E0318 17:45:22.233842 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:45:29.968847401Z E0318 17:45:29.968746 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:45:38.583927829Z E0318 17:45:38.583750 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:45:46.360259202Z E0318 17:45:46.359836 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:45:54.458232109Z E0318 17:45:54.458081 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:46:03.693654607Z E0318 17:46:03.693401 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:46:11.393887520Z E0318 17:46:11.393780 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:46:18.561927521Z E0318 17:46:18.561788 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:46:26.390809895Z E0318 17:46:26.390635 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:46:35.121450844Z E0318 17:46:35.121265 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:46:42.766052317Z E0318 17:46:42.765941 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:46:51.446364229Z E0318 17:46:51.445998 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:47:00.727374832Z E0318 17:47:00.727174 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:47:08.309908280Z E0318 17:47:08.309786 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:47:16.903570262Z E0318 17:47:16.903407 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:47:25.228656621Z E0318 17:47:25.228513 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:47:33.207125987Z E0318 17:47:33.206997 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:47:40.443065804Z E0318 17:47:40.441080 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io kube-scheduler) 2026-03-18T17:47:49.208972144Z E0318 17:47:49.208846 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:47:57.058242007Z E0318 17:47:57.058109 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:48:21.649334163Z I0318 17:48:21.649206 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-18T17:48:21.650311090Z I0318 17:48:21.650208 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7dcf5569b5-m5dh4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:48:21.650496857Z I0318 17:48:21.650433 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-7r9qg" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:48:21.650545499Z I0318 17:48:21.650519 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-nlqpp" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:48:32.514695096Z I0318 17:48:32.514574 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-5c6485487f-z74t2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:32.527217608Z I0318 17:48:32.527119 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78-xnx8x" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:32.530325905Z I0318 17:48:32.530263 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6-d4bmc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:32.530647674Z I0318 17:48:32.530589 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c-9hlvv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:32.534168753Z I0318 17:48:32.534147 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77-djgn7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:32.652058779Z I0318 17:48:32.650926 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-866dc4744-l6hpt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:32.652058779Z I0318 17:48:32.651587 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-zdqtc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:32.677037359Z I0318 17:48:32.664551 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-68bf6ff9d6-hm777" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:32.682331158Z I0318 17:48:32.680537 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-6fbb6cf6f9-6x52p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:32.757793154Z I0318 17:48:32.757627 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-84d549f6d5-b5lps" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:37.249089378Z I0318 17:48:37.248983 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-5l8hh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:41.473203340Z I0318 17:48:41.473037 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-b4f87c5b9-m84zq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:42.724872472Z I0318 17:48:42.724668 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-7r9qg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:42.726725164Z I0318 17:48:42.726691 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-nlqpp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:42.728719319Z I0318 17:48:42.727793 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-7dcf5569b5-m5dh4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:47.571540913Z I0318 17:48:47.570929 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-mpmxb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:48:48.994947252Z I0318 17:48:48.992599 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-6c8df6d4b-fshkm" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006531715156562607030440 0ustar00000000000000002026-03-18T17:40:18.479054774Z I0318 17:40:18.478784 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-p72m2" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:18.583376489Z I0318 17:40:18.582952 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-machine-api/cluster-baremetal-operator-6f69995874-dh5zl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:18.684964367Z I0318 17:40:18.684880 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-66b84d69b-qb7n6" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:18.783364724Z I0318 17:40:18.782606 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-58845fbb57-vjrjg" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:18.883689011Z I0318 17:40:18.883174 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-89ccd998f-l5gm7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:18.985314830Z I0318 17:40:18.984944 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-7bd846bfc4-dxxbl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:40:19.081891198Z I0318 17:40:19.081679 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-qpgfz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:19.181204703Z I0318 17:40:19.180543 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-b865698dc-5zj8r" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:19.280714374Z I0318 17:40:19.280611 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/olm-operator-5c9796789-6hngr" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:19.381967261Z I0318 17:40:19.381133 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-6qqz4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:19.483441206Z I0318 17:40:19.483369 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-598fbc5f8f-7qwxn" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:19.579087264Z I0318 17:40:19.578399 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5f5d689c6b-z9vvz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:19.683336007Z I0318 17:40:19.682736 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-8sxdf" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:20.433406867Z I0318 17:40:20.432366 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-trlzv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:40:32.544755430Z I0318 17:40:32.543212 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-m7wng" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:40:42.684330506Z I0318 17:40:42.683679 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-64tx9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:40:42.810309174Z I0318 17:40:42.809879 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-ttbr5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:40:43.404749079Z I0318 17:40:43.404631 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-mfn52" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:40:45.394522124Z I0318 17:40:45.393704 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-gr8jc" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:54.812468970Z I0318 17:40:54.811886 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-57f769d897-m82wx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:40:55.021780311Z I0318 17:40:55.021692 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-w28hf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:40:56.997490722Z I0318 17:40:56.996507 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-nlqpp" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:40:58.082567149Z I0318 17:40:58.082504 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-ctd49" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:00.700507231Z I0318 17:41:00.700409 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-7s68k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:25.916384664Z I0318 17:41:25.914037 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-5l4qp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.693944767Z I0318 17:41:37.693030 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-qpgfz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.702969974Z I0318 17:41:37.702868 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-89ccd998f-l5gm7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.707665 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-6f69995874-dh5zl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.707822 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-6bb5bfb6fd-xwwcg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.707908 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-lljnt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.708121 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-qk279" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.708223 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-8544cbcf9c-rws9x" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.708547 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-t266j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.708641 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-p72m2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.708696 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-b865698dc-5zj8r" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.708787 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-q27fh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.708854 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-6qqz4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.708944 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-5c9796789-6hngr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.709009 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-5549dc66cb-ljrq8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.709076 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5f5d689c6b-z9vvz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.709134 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-8sxdf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.709196 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-gr8jc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.709260 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-wlfj4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.709553 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-9c5679d8f-7sc7v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.709665 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-66b84d69b-qb7n6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.709797 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-58845fbb57-vjrjg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.711386308Z I0318 17:41:37.709994 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-hpsbd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.722355935Z I0318 17:41:37.712661 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-598fbc5f8f-7qwxn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:37.774166118Z I0318 17:41:37.773652 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-f7jp5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:54.819329928Z I0318 17:41:54.818102 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-64854d9cff-vpjmp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:56.842587363Z I0318 17:41:56.842144 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-f5df8899c-8nhkn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:56.943999962Z I0318 17:41:56.943916 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-6cd6978d68-zdcm4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:57.323671839Z I0318 17:41:57.323573 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-79bc6b8d76-g5brm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:41:59.004006337Z I0318 17:41:59.003935 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-796dc94d9b-4hjzm" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:41:59.038975788Z I0318 17:41:59.038900 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-67ffc948fb-bpqs9" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:00.316408963Z I0318 17:42:00.313306 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-796dc94d9b-4hjzm" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:00.339329897Z I0318 17:42:00.336638 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-67ffc948fb-bpqs9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:00.882673875Z I0318 17:42:00.882619 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6f57667fcd-x6jtn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:00.887620654Z I0318 17:42:00.887560 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-cb78c4f4b-7s77b" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:02.360578452Z I0318 17:42:02.360420 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-cb78c4f4b-7s77b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:02.491794750Z I0318 17:42:02.491725 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7c846c589b-4cpj2" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:04.342379410Z I0318 17:42:04.340209 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-7c846c589b-4cpj2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:06.764355355Z I0318 17:42:06.761720 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-967479477-gwn76" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:08.493726498Z I0318 17:42:08.493652 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-8487694857-8dsx2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:10.595692470Z I0318 17:42:10.595609 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-897b458c6-vsss9" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:12.627883766Z I0318 17:42:12.627450 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-897b458c6-vsss9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:13.324668742Z I0318 17:42:13.324587 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-lf9xl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:13.722359395Z I0318 17:42:13.722233 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-bwcgq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:13.758030850Z I0318 17:42:13.757940 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7dcf5569b5-m5dh4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:42:23.584446239Z I0318 17:42:23.578563 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-688fbbb854-6n26v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:23.720184086Z I0318 17:42:23.720122 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-57777556ff-bk26c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:23.796991076Z I0318 17:42:23.796497 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7f9db7db88-vbx76" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:23.827438327Z I0318 17:42:23.827368 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-7f87dc7fd4-v8b77" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:23.852948998Z I0318 17:42:23.852870 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-6864dc98f7-8vmsv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:28.047042337Z I0318 17:42:28.046982 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-7f87dc7fd4-v8b77" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:28.056149897Z I0318 17:42:28.056078 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-7f9db7db88-vbx76" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:29.496115249Z I0318 17:42:29.496046 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-r6tf4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:30.589337450Z I0318 17:42:30.586758 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-7f87dc7fd4-v8b77" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:35.751206148Z I0318 17:42:35.750726 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-f5755b457-f4cbl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:35.842716811Z I0318 17:42:35.842658 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-57dbfd879f-44tfw" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:37.857809761Z I0318 17:42:37.857695 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-f5755b457-f4cbl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:37.858097218Z I0318 17:42:37.858055 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-57dbfd879f-44tfw" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T17:42:38.705401666Z I0318 17:42:38.705034 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-7r9qg" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T17:42:40.720769062Z I0318 17:42:40.720699 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-f5755b457-f4cbl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:40.723545763Z I0318 17:42:40.723508 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-57dbfd879f-44tfw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:43.434957589Z I0318 17:42:43.434872 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-fg8h6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:43.634367698Z I0318 17:42:43.633916 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-hgw2n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:46.083634453Z I0318 17:42:46.083550 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-j4kft" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:48.267926038Z I0318 17:42:48.267841 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-jlj6j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:51.325050922Z I0318 17:42:51.324616 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-7d58488df-l48xm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:51.460494472Z I0318 17:42:51.459734 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-8485d" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:51.514602454Z I0318 17:42:51.513458 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-vbglp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:51.542643321Z I0318 17:42:51.541985 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-b8b994c95-kglwt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:53.632924636Z I0318 17:42:53.632651 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-6xmx4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:42:54.030469776Z I0318 17:42:54.029205 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-bgdql" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T17:43:00.246374992Z E0318 17:43:00.246266 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-03-18T17:43:05.246838209Z E0318 17:43:05.246711 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:43:05.246838209Z I0318 17:43:05.246759 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-18T17:43:10.248348497Z E0318 17:43:10.247956 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T17:43:10.248348497Z E0318 17:43:10.248036 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515156562607023021 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"d95a26b3-70d6-4f47-b342-b1b1b1c9b7db","resourceVersion":"9101","creationTimestamp":"2026-03-18T17:41:06Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.mirror":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.seen":"2026-03-18T17:39:43.468134605Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"6acd4a61-9d80-4f54-90a7-4ba0eb46353d","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:50Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:50Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:43:13Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:43:13Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:50Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T17:41:50Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-18T17:43:12Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-18T17:39:52Z","finishedAt":"2026-03-18T17:43:10Z","containerID":"cri-o://774c63dac090e52a2318d2a44e73b16fc328b4dc2d265dcfd10522ed7532c288"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","containerID":"cri-o://39e81d7022f76aa50f44926362dbcc435bd580e0e562220512ebed69c23461e5","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415156562607044176 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-qk2792026-03-18T17:48:17.387566465Z I0318 17:48:17.387359 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:48:17.387566465Z I0318 17:48:17.387509 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:48:17.387986911Z I0318 17:48:17.387946 1 observer_polling.go:159] Starting file observer 2026-03-18T17:48:17.411123503Z I0318 17:48:17.410998 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-18T17:48:18.114034395Z I0318 17:48:18.113893 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T17:48:18.114034395Z W0318 17:48:18.113994 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:18.114034395Z W0318 17:48:18.114009 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:18.114034395Z W0318 17:48:18.114023 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T17:48:18.114096797Z W0318 17:48:18.114032 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T17:48:18.114096797Z W0318 17:48:18.114044 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T17:48:18.114096797Z W0318 17:48:18.114052 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T17:48:18.116958906Z I0318 17:48:18.116883 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T17:48:18.117394462Z I0318 17:48:18.117238 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T17:48:18.117394462Z I0318 17:48:18.117327 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T17:48:18.117394462Z I0318 17:48:18.117351 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-03-18T17:48:18.117464975Z I0318 17:48:18.117387 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T17:48:18.117464975Z I0318 17:48:18.117405 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T17:48:18.117530948Z I0318 17:48:18.117425 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T17:48:18.117530948Z I0318 17:48:18.117501 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:18.118032476Z I0318 17:48:18.117782 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T17:48:18.118032476Z I0318 17:48:18.117796 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T17:48:18.118032476Z I0318 17:48:18.117831 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T17:48:18.218451623Z I0318 17:48:18.218349 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:18.218451623Z I0318 17:48:18.218391 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T17:48:18.218537306Z I0318 17:48:18.218482 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-controller-manager-operator_previous.log0000640000000000000000000000247115156562607044377 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-qk2792026-03-18T17:46:16.563679163Z I0318 17:46:16.563546 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:46:16.563772115Z I0318 17:46:16.563667 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:46:16.564126854Z I0318 17:46:16.564104 1 observer_polling.go:159] Starting file observer 2026-03-18T17:47:16.571463208Z W0318 17:47:16.571348 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-operator-ff989d6cc-qk279) 2026-03-18T17:47:16.571586481Z I0318 17:47:16.571550 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-18T17:47:46.990131805Z F0318 17:47:46.990031 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock": context deadline exceeded kube-controller-manager-operator-ff989d6cc-qk279.json0000640000000000000000000001672115156562607033322 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-ff989d6cc-qk279","generateName":"kube-controller-manager-operator-ff989d6cc-","namespace":"openshift-kube-controller-manager-operator","uid":"9b424d6c-7440-4c98-ac19-2d0642c696fd","resourceVersion":"9670","creationTimestamp":"2026-03-18T17:40:18Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"ff989d6cc"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.6/23\"],\"mac_address\":\"0a:58:0a:80:00:06\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.6/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.6\"\n ],\n \"mac\": \"0a:58:0a:80:00:06\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-ff989d6cc","uid":"67ca90e0-a295-4c3f-bd75-fbb26f24160d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67c988e079558dc6b20232ebf9a7f7276fee60c756caed584c9715e0bec77a5a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:17Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:17Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.6","podIPs":[{"ip":"10.128.0.6"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-18T17:48:17Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 17:46:16.563546 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 17:46:16.563667 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 17:46:16.564104 1 observer_polling.go:159] Starting file observer\nW0318 17:47:16.571348 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-operator-ff989d6cc-qk279)\nI0318 17:47:16.571550 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0\nF0318 17:47:46.990031 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-18T17:46:16Z","finishedAt":"2026-03-18T17:47:47Z","containerID":"cri-o://1fd744dbcfad29e0a4211253fc988f9ef696171ed5032f9e61793918d136f6fa"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","containerID":"cri-o://733c4831624297f5112d8028d0486f0fad40d94494178f2290df8fe70a7c80e2","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-controller-manager-recovery-controller_current.log0000640000000000000000000002560715156562607042065 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T17:48:15.865889567Z + timeout 3m /bin/bash -exuo pipefail -c 'while [ -n "$(ss -Htanop \( sport = 9443 \))" ]; do sleep 1; done' 2026-03-18T17:48:15.870655229Z ++ ss -Htanop '(' sport = 9443 ')' 2026-03-18T17:48:15.885373740Z + '[' -n '' ']' 2026-03-18T17:48:15.886741592Z + exec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=openshift-kube-controller-manager --listen=0.0.0.0:9443 -v=2 2026-03-18T17:48:15.935187058Z W0318 17:48:15.934978 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-18T17:48:15.935405506Z I0318 17:48:15.935371 1 crypto.go:601] Generating new CA for cert-recovery-controller-signer@1773856095 cert, and key in /tmp/serving-cert-2259568489/serving-signer.crt, /tmp/serving-cert-2259568489/serving-signer.key 2026-03-18T17:48:16.346503390Z I0318 17:48:16.346400 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:48:16.347484997Z I0318 17:48:16.347406 1 observer_polling.go:159] Starting file observer 2026-03-18T17:48:16.348184753Z I0318 17:48:16.348147 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T17:48:16.348184753Z I0318 17:48:16.348168 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T17:48:16.354847678Z W0318 17:48:16.354776 1 builder.go:272] unable to get owner reference (falling back to namespace): Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/pods": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:16.355024754Z I0318 17:48:16.354992 1 builder.go:304] cert-recovery-controller version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-18T17:48:16.359341558Z W0318 17:48:16.359299 1 builder.go:364] unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:16.360263524Z I0318 17:48:16.360230 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager/cert-recovery-controller-lock... 2026-03-18T17:48:16.360437321Z I0318 17:48:16.359407 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-controller-manager", Name:"openshift-kube-controller-manager", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ControlPlaneTopology' unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:16.365548805Z E0318 17:48:16.365466 1 leaderelection.go:436] error retrieving resource lock openshift-kube-controller-manager/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:16.367744868Z E0318 17:48:16.367615 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189e00b8aa27b04f openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 17:48:16.359264335 +0000 UTC m=+0.468202000,LastTimestamp:2026-03-18 17:48:16.359264335 +0000 UTC m=+0.468202000,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T17:48:22.180297513Z E0318 17:48:22.180144 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189e00b8aa27b04f openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 17:48:16.359264335 +0000 UTC m=+0.468202000,LastTimestamp:2026-03-18 17:48:16.359264335 +0000 UTC m=+0.468202000,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T17:48:32.184027993Z E0318 17:48:32.183939 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189e00b8aa27b04f openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 17:48:16.359264335 +0000 UTC m=+0.468202000,LastTimestamp:2026-03-18 17:48:16.359264335 +0000 UTC m=+0.468202000,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T17:48:42.189727424Z E0318 17:48:42.189643 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189e00b8aa27b04f openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 17:48:16.359264335 +0000 UTC m=+0.468202000,LastTimestamp:2026-03-18 17:48:16.359264335 +0000 UTC m=+0.468202000,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" kube-controller-manager-cert-syncer_current.log0000640000000000000000000002717215156562607040303 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T17:48:15.709772719Z I0318 17:48:15.709150 1 base_controller.go:76] Waiting for caches to sync for CertSyncController 2026-03-18T17:48:15.709772719Z I0318 17:48:15.709230 1 observer_polling.go:159] Starting file observer 2026-03-18T17:48:15.714305932Z W0318 17:48:15.714222 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:15.714355044Z E0318 17:48:15.714325 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T17:48:15.716461644Z W0318 17:48:15.716372 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:15.716523397Z E0318 17:48:15.716494 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T17:48:16.873331992Z W0318 17:48:16.873228 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:16.873376444Z E0318 17:48:16.873337 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T17:48:16.905804019Z W0318 17:48:16.905717 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:16.905868551Z E0318 17:48:16.905803 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T17:48:19.167053636Z W0318 17:48:19.166928 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:19.167053636Z E0318 17:48:19.166985 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T17:48:19.170662743Z W0318 17:48:19.170546 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:19.170662743Z E0318 17:48:19.170600 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T17:48:24.427361208Z W0318 17:48:24.427196 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:24.427361208Z E0318 17:48:24.427309 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T17:48:24.472675565Z W0318 17:48:24.472588 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:24.472675565Z E0318 17:48:24.472648 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T17:48:33.578735287Z W0318 17:48:33.578629 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:33.578781648Z E0318 17:48:33.578746 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T17:48:35.861198856Z W0318 17:48:35.861033 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T17:48:35.861198856Z E0318 17:48:35.861128 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" cluster-policy-controller_current.log0000640000000000000000000005053415156562607036465 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T17:48:16.629830965Z E0318 17:48:16.629822 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-route-controller-manager" should be enqueued: namespace "openshift-route-controller-manager" not found 2026-03-18T17:48:16.629862256Z E0318 17:48:16.629853 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-route-controller-manager" should be enqueued: namespace "openshift-route-controller-manager" not found 2026-03-18T17:48:16.629890297Z E0318 17:48:16.629882 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-route-controller-manager" should be enqueued: namespace "openshift-route-controller-manager" not found 2026-03-18T17:48:16.629912698Z E0318 17:48:16.629904 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-route-controller-manager" should be enqueued: namespace "openshift-route-controller-manager" not found 2026-03-18T17:48:16.629946969Z E0318 17:48:16.629938 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-18T17:48:16.629969470Z E0318 17:48:16.629961 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-18T17:48:16.629999971Z E0318 17:48:16.629991 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-18T17:48:16.630036412Z E0318 17:48:16.630027 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-18T17:48:16.630058813Z E0318 17:48:16.630050 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-18T17:48:16.630081634Z E0318 17:48:16.630073 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-18T17:48:16.630109735Z E0318 17:48:16.630101 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-18T17:48:16.630132946Z E0318 17:48:16.630124 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-18T17:48:16.630164597Z E0318 17:48:16.630156 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-user-workload-monitoring" should be enqueued: namespace "openshift-user-workload-monitoring" not found 2026-03-18T17:48:16.630193648Z E0318 17:48:16.630185 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-user-workload-monitoring" should be enqueued: namespace "openshift-user-workload-monitoring" not found 2026-03-18T17:48:16.630225850Z E0318 17:48:16.630217 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-user-workload-monitoring" should be enqueued: namespace "openshift-user-workload-monitoring" not found 2026-03-18T17:48:16.630257361Z E0318 17:48:16.630249 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-vsphere-infra" should be enqueued: namespace "openshift-vsphere-infra" not found 2026-03-18T17:48:16.630297132Z E0318 17:48:16.630287 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-vsphere-infra" should be enqueued: namespace "openshift-vsphere-infra" not found 2026-03-18T17:48:16.630336254Z E0318 17:48:16.630326 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-vsphere-infra" should be enqueued: namespace "openshift-vsphere-infra" not found 2026-03-18T17:48:16.630361045Z E0318 17:48:16.630351 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift" should be enqueued: namespace "openshift" not found 2026-03-18T17:48:16.630390566Z E0318 17:48:16.630382 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift" should be enqueued: namespace "openshift" not found 2026-03-18T17:48:16.630416257Z E0318 17:48:16.630408 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift" should be enqueued: namespace "openshift" not found 2026-03-18T17:48:16.704015411Z I0318 17:48:16.703933 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:16.805562750Z I0318 17:48:16.805485 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:16.834608037Z I0318 17:48:16.834567 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:16.995416983Z I0318 17:48:16.995257 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:17.006331099Z I0318 17:48:17.006158 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:17.198551953Z I0318 17:48:17.198446 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:17.205733247Z I0318 17:48:17.205071 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:17.393399717Z I0318 17:48:17.393339 1 request.go:700] Waited for 1.190571992s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/api/v1/namespaces?limit=500&resourceVersion=0 2026-03-18T17:48:17.405257749Z I0318 17:48:17.405162 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:17.406980594Z I0318 17:48:17.406941 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:17.446258001Z I0318 17:48:17.446182 1 base_controller.go:74] Caches are synced for pod-security-admission-label-synchronization-controller 2026-03-18T17:48:17.446258001Z I0318 17:48:17.446210 1 base_controller.go:111] Starting #1 worker of pod-security-admission-label-synchronization-controller controller ... 2026-03-18T17:48:17.449553836Z I0318 17:48:17.449465 1 shared_informer.go:320] Caches are synced for privileged-namespaces-psa-label-syncer 2026-03-18T17:48:17.458851711Z I0318 17:48:17.458806 1 base_controller.go:74] Caches are synced for namespace-security-allocation-controller 2026-03-18T17:48:17.458851711Z I0318 17:48:17.458835 1 base_controller.go:111] Starting #1 worker of namespace-security-allocation-controller controller ... 2026-03-18T17:48:17.458922784Z I0318 17:48:17.458902 1 namespace_scc_allocation_controller.go:111] Repairing SCC UID Allocations 2026-03-18T17:48:17.604952148Z I0318 17:48:17.604900 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:17.694083524Z I0318 17:48:17.693976 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:17.751472030Z W0318 17:48:17.751371 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T17:48:17.751527022Z E0318 17:48:17.751453 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T17:48:17.804622885Z I0318 17:48:17.804565 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:17.805098493Z I0318 17:48:17.805071 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:17.997052487Z I0318 17:48:17.996915 1 reflector.go:368] Caches populated for *v1.LimitRange from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:18.005896974Z I0318 17:48:18.005823 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:18.104414228Z I0318 17:48:18.104335 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-03-18T17:48:18.195699956Z I0318 17:48:18.195452 1 reflector.go:368] Caches populated for *v1.PodTemplate from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:18.205817161Z I0318 17:48:18.205745 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:18.393821325Z I0318 17:48:18.393737 1 request.go:700] Waited for 2.190465999s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/api/v1/resourcequotas?limit=500&resourceVersion=0 2026-03-18T17:48:18.396882672Z I0318 17:48:18.396825 1 reflector.go:368] Caches populated for *v1.ResourceQuota from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:18.405630825Z I0318 17:48:18.405558 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:18.595813161Z I0318 17:48:18.595726 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:18.605736958Z I0318 17:48:18.605696 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:18.804944058Z I0318 17:48:18.804842 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:19.007684853Z I0318 17:48:19.007593 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:19.012233566Z I0318 17:48:19.012140 1 namespace_scc_allocation_controller.go:116] Repair complete 2026-03-18T17:48:19.205618914Z I0318 17:48:19.205566 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:19.403334558Z I0318 17:48:19.403242 1 request.go:700] Waited for 3.188609899s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/monitoring.coreos.com/v1/thanosrulers?limit=500&resourceVersion=0 2026-03-18T17:48:19.405661427Z I0318 17:48:19.405568 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:19.605569043Z I0318 17:48:19.605496 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:19.806045372Z I0318 17:48:19.805960 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:20.006101504Z I0318 17:48:20.005998 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:20.122966357Z W0318 17:48:20.122873 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T17:48:20.123022549Z E0318 17:48:20.122996 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T17:48:20.205761931Z I0318 17:48:20.205673 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:20.403922311Z I0318 17:48:20.403812 1 request.go:700] Waited for 4.18887796s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/machine.openshift.io/v1/controlplanemachinesets?limit=500&resourceVersion=0 2026-03-18T17:48:20.405801803Z I0318 17:48:20.405742 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:20.609237944Z I0318 17:48:20.609107 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:20.807608202Z I0318 17:48:20.807521 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:21.008245677Z I0318 17:48:21.008141 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:21.205464441Z I0318 17:48:21.205350 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:21.404061438Z I0318 17:48:21.403987 1 request.go:700] Waited for 5.18882426s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/monitoring.openshift.io/v1/alertingrules?limit=500&resourceVersion=0 2026-03-18T17:48:21.405738482Z I0318 17:48:21.405707 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:21.606007172Z I0318 17:48:21.605928 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:21.805820255Z I0318 17:48:21.805659 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:22.006366456Z I0318 17:48:22.006267 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:22.206573775Z I0318 17:48:22.206476 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:22.405463563Z I0318 17:48:22.405341 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:22.603616762Z I0318 17:48:22.603542 1 request.go:700] Waited for 6.384770757s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/network.operator.openshift.io/v1/egressrouters?limit=500&resourceVersion=0 2026-03-18T17:48:22.606020553Z I0318 17:48:22.605908 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:22.805217923Z I0318 17:48:22.805142 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:23.005449733Z I0318 17:48:23.005260 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:23.204796118Z I0318 17:48:23.204717 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:23.405472534Z I0318 17:48:23.405397 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:23.603860842Z I0318 17:48:23.603755 1 request.go:700] Waited for 7.384881381s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/whereabouts.cni.cncf.io/v1alpha1/nodeslicepools?limit=500&resourceVersion=0 2026-03-18T17:48:23.606256603Z I0318 17:48:23.606196 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:23.754772002Z I0318 17:48:23.754666 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-cluster-autoscaler-operator" not found 2026-03-18T17:48:23.804267088Z I0318 17:48:23.804176 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:24.006854167Z I0318 17:48:24.005260 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:24.206048536Z I0318 17:48:24.205929 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:24.404513628Z I0318 17:48:24.404439 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:24.605226476Z I0318 17:48:24.605110 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T17:48:24.615576090Z I0318 17:48:24.615510 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-18T17:48:24.637440733Z I0318 17:48:24.637364 1 reconciliation_controller.go:149] Caches are synced 2026-03-18T17:48:24.704257869Z I0318 17:48:24.704153 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s" not found 2026-03-18T17:48:25.045619715Z W0318 17:48:25.045531 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T17:48:25.045619715Z E0318 17:48:25.045598 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T17:48:28.179400158Z I0318 17:48:28.179101 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found 2026-03-18T17:48:36.767105361Z W0318 17:48:36.767022 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T17:48:36.767105361Z E0318 17:48:36.767077 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" kube-controller-manager_current.log0000640000000000000000000010311015156562607036032 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T17:48:34.823830304Z I0318 17:48:34.823794 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: kube-rbac-proxy-cluster-autoscaler-operator, uid: c3d6f8c8-5f0a-4b17-8a8e-95e3c1f60472]" virtual=false 2026-03-18T17:48:34.839100392Z I0318 17:48:34.838958 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-cluster-storage-operator, name: cluster-storage-operator, uid: ce4b655b-a8d1-4196-bcb4-51c2540a6fb0]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.839100392Z I0318 17:48:34.839047 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: machine-api-operator-images, uid: 04515fa9-31b7-4893-8bd7-cdb1a1cb6d7d]" virtual=false 2026-03-18T17:48:34.851203912Z I0318 17:48:34.851142 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-operator-lifecycle-manager, name: olm-operator-serviceaccount, uid: f1ca6fb2-666d-4acb-bd5d-7f446dc7ad85]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.851341145Z I0318 17:48:34.851201 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: mao-trusted-ca, uid: def72cf9-fc46-4043-a8b9-4ba3013630a9]" virtual=false 2026-03-18T17:48:34.852285683Z I0318 17:48:34.852239 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-dns, name: builder, uid: 29149989-8a0e-4d88-b150-4024189cbe7f]" 2026-03-18T17:48:34.852303103Z I0318 17:48:34.852262 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: coreos-bootimages, uid: 8ac10bd2-d2ec-4cba-bb19-af1603fe01bb]" virtual=false 2026-03-18T17:48:34.892894951Z I0318 17:48:34.892763 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-cloud-controller-manager, name: cloud-node-manager, uid: 69d4707f-f370-4557-b208-8455017f7b80]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.892894951Z I0318 17:48:34.892842 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: kube-rbac-proxy, uid: 2158d90d-e731-4a09-a65f-a59700c045db]" virtual=false 2026-03-18T17:48:34.896913054Z I0318 17:48:34.896795 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-controller-manager-operator, name: openshift-controller-manager-operator, uid: 26885a2d-64ae-42e7-a142-6b69ca0a46db]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.896913054Z I0318 17:48:34.896836 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: machine-config-operator-images, uid: 263b4918-dab5-4521-8ffc-cd7747076cac]" virtual=false 2026-03-18T17:48:34.899702552Z I0318 17:48:34.899649 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-machine-api, name: machine-api-termination-handler, uid: d66e6c81-4998-4cbf-8ec8-5bab732d0bc2]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.899768254Z I0318 17:48:34.899748 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: machine-config-osimageurl, uid: d204c7f7-1f82-40e1-ba14-6dcba9f8fdbe]" virtual=false 2026-03-18T17:48:34.902425099Z I0318 17:48:34.902396 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-apiserver-operator, name: openshift-apiserver-operator, uid: 6a146891-77b3-4763-830f-3bfdfe29c851]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.902484650Z I0318 17:48:34.902465 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-marketplace, name: marketplace-trusted-ca, uid: fe0a038a-63c3-41f1-a097-ff53df299de8]" virtual=false 2026-03-18T17:48:34.910048572Z I0318 17:48:34.909949 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-kube-controller-manager-operator, name: kube-controller-manager-operator, uid: 550062ce-8f29-4c85-855f-0415565681d9]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.910131684Z I0318 17:48:34.910082 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-monitoring, name: telemetry-config, uid: 22f4156f-fda9-462b-a571-4a2f4cf056d4]" virtual=false 2026-03-18T17:48:34.912386588Z I0318 17:48:34.912354 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-machine-api, name: cluster-autoscaler-operator, uid: 9cd11c74-0f7d-462e-9116-12269574958c]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.912434109Z I0318 17:48:34.912416 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: cni-copy-resources, uid: d56a1de7-b237-44d0-918f-bfa5b5ff7ff0]" virtual=false 2026-03-18T17:48:34.922863172Z I0318 17:48:34.922789 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-kube-scheduler-operator, name: openshift-kube-scheduler-operator, uid: 022209ac-6486-42e1-b01a-c3c45e1a4d80]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.922882462Z I0318 17:48:34.922854 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: default-cni-sysctl-allowlist, uid: 25257844-04d9-445c-a5e3-91da514c107e]" virtual=false 2026-03-18T17:48:34.926624267Z I0318 17:48:34.926564 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-insights, name: operator, uid: 9d6133e9-7509-41b0-bbb8-97540d4dfce5]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.926624267Z I0318 17:48:34.926603 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: multus-daemon-config, uid: 73de9192-f7aa-4f44-9ef0-8ae77c5300e7]" virtual=false 2026-03-18T17:48:34.929131527Z I0318 17:48:34.929064 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-kube-storage-version-migrator-operator, name: config, uid: 01c8f669-9405-46e5-88fb-d6b9890771b1]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.929190919Z I0318 17:48:34.929172 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: whereabouts-flatfile-config, uid: 6f8dcc47-834d-476b-a2f7-6dd1d27716bb]" virtual=false 2026-03-18T17:48:34.932602024Z I0318 17:48:34.932570 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-cloud-credential-operator, name: cloud-credential-operator, uid: d2b859e5-f048-44fe-aac0-27be3e958e87]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.932650466Z I0318 17:48:34.932634 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-node-identity, name: ovnkube-identity-cm, uid: 4f1f2010-63c7-4c3c-9429-d44dd4dff029]" virtual=false 2026-03-18T17:48:34.938022606Z I0318 17:48:34.937991 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-cluster-olm-operator, name: cluster-olm-operator, uid: a6136e20-1f62-4790-8d65-40794471bbb7]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.938101809Z I0318 17:48:34.938084 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-operator, name: applied-cluster, uid: 7cec6f53-bd77-41c0-9bae-a3b272a9b84d]" virtual=false 2026-03-18T17:48:34.943184351Z I0318 17:48:34.940816 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ServiceAccount, namespace: openshift-ovn-kubernetes, name: ovn-kubernetes-control-plane, uid: 29c2e551-4b07-4f63-a4c4-6e05db587fb3]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}] 2026-03-18T17:48:34.943184351Z I0318 17:48:34.940887 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-operator, name: iptables-alerter-script, uid: acdf1a75-274a-48ca-ad01-2a3d5ff78b41]" virtual=false 2026-03-18T17:48:34.944786907Z I0318 17:48:34.944723 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: baremetal-kube-rbac-proxy, uid: 1d80ecd2-1fc3-4ee3-91a6-a2a9060fbdc0]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.944806367Z I0318 17:48:34.944787 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-oauth-apiserver, name: revision-status-1, uid: cf61fecd-e7a4-4719-af2d-56d1f2c93e5d]" virtual=false 2026-03-18T17:48:34.946012521Z I0318 17:48:34.945983 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: cbo-trusted-ca, uid: 4f810132-8d4f-4c04-87c8-2ec01e0674e4]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d"}] 2026-03-18T17:48:34.946065142Z I0318 17:48:34.946045 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-config, uid: 2a031061-136c-4f0d-857e-b9cc77b26bc7]" virtual=false 2026-03-18T17:48:34.949324203Z I0318 17:48:34.949265 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: cluster-baremetal-operator-images, uid: 1a3f038e-e3be-490d-a71a-4fa6bc691e0a]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.949342384Z I0318 17:48:34.949318 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-script-lib, uid: 19c77dd3-e8fb-4d2a-824b-7b1977fa6006]" virtual=false 2026-03-18T17:48:34.953100780Z I0318 17:48:34.953073 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: kube-rbac-proxy, uid: 9d5bfe15-b5b0-4677-9959-f0dbf4668497]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.953149461Z I0318 17:48:34.953132 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-service-ca-operator, name: service-ca-operator-config, uid: 1c20141a-a3fe-4f53-9129-f9c60b7bb19a]" virtual=false 2026-03-18T17:48:34.954941931Z I0318 17:48:34.954901 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: kube-rbac-proxy-cluster-autoscaler-operator, uid: c3d6f8c8-5f0a-4b17-8a8e-95e3c1f60472]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.973915013Z I0318 17:48:34.973824 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: machine-api-operator-images, uid: 04515fa9-31b7-4893-8bd7-cdb1a1cb6d7d]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:34.982898615Z I0318 17:48:34.982818 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: mao-trusted-ca, uid: def72cf9-fc46-4043-a8b9-4ba3013630a9]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d"}] 2026-03-18T17:48:34.988407379Z I0318 17:48:34.988342 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: coreos-bootimages, uid: 8ac10bd2-d2ec-4cba-bb19-af1603fe01bb]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:35.008940366Z I0318 17:48:35.008884 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-oauth-apiserver, name: revision-status-1, uid: cf61fecd-e7a4-4719-af2d-56d1f2c93e5d]" 2026-03-18T17:48:35.023165685Z I0318 17:48:35.023066 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: kube-rbac-proxy, uid: 2158d90d-e731-4a09-a65f-a59700c045db]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:35.025583692Z I0318 17:48:35.025511 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: machine-config-operator-images, uid: 263b4918-dab5-4521-8ffc-cd7747076cac]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:35.028775722Z I0318 17:48:35.028705 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: machine-config-osimageurl, uid: d204c7f7-1f82-40e1-ba14-6dcba9f8fdbe]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:35.031868259Z I0318 17:48:35.031826 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-marketplace, name: marketplace-trusted-ca, uid: fe0a038a-63c3-41f1-a097-ff53df299de8]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:35.035770158Z I0318 17:48:35.035730 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-monitoring, name: telemetry-config, uid: 22f4156f-fda9-462b-a571-4a2f4cf056d4]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:35.039319017Z I0318 17:48:35.039245 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: cni-copy-resources, uid: d56a1de7-b237-44d0-918f-bfa5b5ff7ff0]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}] 2026-03-18T17:48:35.043017401Z I0318 17:48:35.042926 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: default-cni-sysctl-allowlist, uid: 25257844-04d9-445c-a5e3-91da514c107e]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}] 2026-03-18T17:48:35.046401886Z I0318 17:48:35.046352 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: multus-daemon-config, uid: 73de9192-f7aa-4f44-9ef0-8ae77c5300e7]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}] 2026-03-18T17:48:35.049062431Z I0318 17:48:35.049019 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: whereabouts-flatfile-config, uid: 6f8dcc47-834d-476b-a2f7-6dd1d27716bb]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}] 2026-03-18T17:48:35.052479686Z I0318 17:48:35.052417 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-node-identity, name: ovnkube-identity-cm, uid: 4f1f2010-63c7-4c3c-9429-d44dd4dff029]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}] 2026-03-18T17:48:35.056896401Z I0318 17:48:35.056837 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-operator, name: applied-cluster, uid: 7cec6f53-bd77-41c0-9bae-a3b272a9b84d]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}] 2026-03-18T17:48:35.060591594Z I0318 17:48:35.060520 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-operator, name: iptables-alerter-script, uid: acdf1a75-274a-48ca-ad01-2a3d5ff78b41]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}] 2026-03-18T17:48:35.062882558Z I0318 17:48:35.062852 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-config, uid: 2a031061-136c-4f0d-857e-b9cc77b26bc7]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}] 2026-03-18T17:48:35.067309182Z I0318 17:48:35.067188 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-script-lib, uid: 19c77dd3-e8fb-4d2a-824b-7b1977fa6006]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}] 2026-03-18T17:48:35.069473583Z I0318 17:48:35.069443 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-service-ca-operator, name: service-ca-operator-config, uid: 1c20141a-a3fe-4f53-9129-f9c60b7bb19a]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}] 2026-03-18T17:48:37.746088777Z I0318 17:48:37.746027 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="13.426247ms" 2026-03-18T17:48:37.746204760Z I0318 17:48:37.746187 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="36.651µs" 2026-03-18T17:48:37.801317435Z I0318 17:48:37.799686 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6" duration="13.242121ms" 2026-03-18T17:48:37.801317435Z I0318 17:48:37.799771 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6" duration="41.401µs" 2026-03-18T17:48:38.764897227Z I0318 17:48:38.764813 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="74.603µs" 2026-03-18T17:48:39.770935861Z I0318 17:48:39.769086 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="74.832µs" 2026-03-18T17:48:40.768841017Z I0318 17:48:40.768335 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="125.363µs" 2026-03-18T17:48:41.448919888Z I0318 17:48:41.448804 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" need=1 creating=1 2026-03-18T17:48:41.473201520Z I0318 17:48:41.472859 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T17:48:41.474459565Z I0318 17:48:41.474346 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="25.570297ms" 2026-03-18T17:48:41.484950949Z I0318 17:48:41.484366 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="9.836236ms" 2026-03-18T17:48:41.510780333Z I0318 17:48:41.510690 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="26.213515ms" 2026-03-18T17:48:41.510888727Z I0318 17:48:41.510850 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="99.863µs" 2026-03-18T17:48:42.348195218Z I0318 17:48:42.348054 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="84.372µs" 2026-03-18T17:48:42.724880402Z I0318 17:48:42.724758 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="118.943µs" 2026-03-18T17:48:42.729787030Z I0318 17:48:42.729710 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="81.262µs" 2026-03-18T17:48:42.731405295Z I0318 17:48:42.730180 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="63.271µs" 2026-03-18T17:48:42.750233433Z I0318 17:48:42.749974 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="106.873µs" 2026-03-18T17:48:42.761370045Z I0318 17:48:42.761247 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="46.631µs" 2026-03-18T17:48:42.787628301Z I0318 17:48:42.787181 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="58.912µs" 2026-03-18T17:48:42.807945862Z I0318 17:48:42.807676 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="45.481µs" 2026-03-18T17:48:42.839111516Z I0318 17:48:42.839016 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="11.237426ms" 2026-03-18T17:48:42.839827635Z I0318 17:48:42.839701 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="116.743µs" 2026-03-18T17:48:42.856544644Z I0318 17:48:42.856101 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="99.423µs" 2026-03-18T17:48:43.186426826Z I0318 17:48:43.186315 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/package-server-manager-7b95f86987" duration="17.848272ms" 2026-03-18T17:48:43.186638522Z I0318 17:48:43.186504 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/package-server-manager-7b95f86987" duration="106.243µs" 2026-03-18T17:48:44.408902209Z I0318 17:48:44.408801 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="75.132µs" 2026-03-18T17:48:45.078509568Z I0318 17:48:45.076414 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="132.333µs" 2026-03-18T17:48:45.852342140Z I0318 17:48:45.848624 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="9.942739ms" 2026-03-18T17:48:45.852342140Z I0318 17:48:45.848697 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="33.181µs" 2026-03-18T17:48:47.871956648Z I0318 17:48:47.871869 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="80.362µs" 2026-03-18T17:48:47.899217383Z I0318 17:48:47.899160 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="67.562µs" 2026-03-18T17:48:47.953333190Z I0318 17:48:47.952861 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="15.895276ms" 2026-03-18T17:48:47.953333190Z I0318 17:48:47.953073 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="60.012µs" 2026-03-18T17:48:48.973197321Z I0318 17:48:48.973138 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/prometheus-operator-6c8df6d4b" need=1 creating=1 2026-03-18T17:48:48.989441597Z I0318 17:48:48.989397 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T17:48:48.996938808Z I0318 17:48:48.996831 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="23.734756ms" 2026-03-18T17:48:49.006937287Z I0318 17:48:49.006874 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="9.990809ms" 2026-03-18T17:48:49.006966058Z I0318 17:48:49.006950 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="36.111µs" 2026-03-18T17:48:49.012731280Z I0318 17:48:49.012692 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="41.541µs" 2026-03-18T17:48:49.027807123Z I0318 17:48:49.026846 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="53.971µs" config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000011412515156562607031014 0ustar00000000000000002026-03-18T17:47:42.144366245Z (string) (len=10) "csr-signer" 2026-03-18T17:47:42.144366245Z }, 2026-03-18T17:47:42.144366245Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-18T17:47:42.144366245Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-18T17:47:42.144366245Z (string) (len=20) "aggregator-client-ca", 2026-03-18T17:47:42.144366245Z (string) (len=9) "client-ca" 2026-03-18T17:47:42.144366245Z }, 2026-03-18T17:47:42.144366245Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T17:47:42.144366245Z (string) (len=17) "trusted-ca-bundle" 2026-03-18T17:47:42.144366245Z }, 2026-03-18T17:47:42.144366245Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-18T17:47:42.144366245Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T17:47:42.144366245Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T17:47:42.144366245Z Timeout: (time.Duration) 2m0s, 2026-03-18T17:47:42.144366245Z StaticPodManifestsLockFile: (string) "", 2026-03-18T17:47:42.144366245Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T17:47:42.144366245Z KubeletVersion: (string) "" 2026-03-18T17:47:42.144366245Z }) 2026-03-18T17:47:42.239253150Z I0318 17:47:42.239144 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T17:47:42.252484314Z I0318 17:47:42.252392 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T17:47:42.252568607Z I0318 17:47:42.252513 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T17:47:42.252568607Z I0318 17:47:42.252541 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T17:47:42.256121353Z I0318 17:47:42.256088 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-18T17:48:12.256665544Z I0318 17:48:12.256615 1 cmd.go:524] Getting installer pods for node master-0 2026-03-18T17:48:12.267292869Z I0318 17:48:12.267215 1 cmd.go:542] Latest installer revision for node master-0 is: 2 2026-03-18T17:48:12.267370502Z I0318 17:48:12.267356 1 cmd.go:431] Querying kubelet version for node master-0 2026-03-18T17:48:12.271441116Z I0318 17:48:12.271414 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-03-18T17:48:12.271522279Z I0318 17:48:12.271490 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-18T17:48:12.271701866Z I0318 17:48:12.271686 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-18T17:48:12.271747508Z I0318 17:48:12.271736 1 cmd.go:229] Getting secrets ... 2026-03-18T17:48:12.275309923Z I0318 17:48:12.275260 1 copy.go:32] Got secret openshift-kube-controller-manager/localhost-recovery-client-token-2 2026-03-18T17:48:12.278382131Z I0318 17:48:12.278337 1 copy.go:32] Got secret openshift-kube-controller-manager/service-account-private-key-2 2026-03-18T17:48:12.281098735Z I0318 17:48:12.281059 1 copy.go:32] Got secret openshift-kube-controller-manager/serving-cert-2 2026-03-18T17:48:12.281143347Z I0318 17:48:12.281109 1 cmd.go:242] Getting config maps ... 2026-03-18T17:48:12.284650830Z I0318 17:48:12.284557 1 copy.go:60] Got configMap openshift-kube-controller-manager/cluster-policy-controller-config-2 2026-03-18T17:48:12.287141415Z I0318 17:48:12.287103 1 copy.go:60] Got configMap openshift-kube-controller-manager/config-2 2026-03-18T17:48:12.289482924Z I0318 17:48:12.289452 1 copy.go:60] Got configMap openshift-kube-controller-manager/controller-manager-kubeconfig-2 2026-03-18T17:48:12.291119746Z I0318 17:48:12.291075 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-cert-syncer-kubeconfig-2 2026-03-18T17:48:12.293941534Z I0318 17:48:12.293899 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-manager-pod-2 2026-03-18T17:48:12.460405047Z I0318 17:48:12.460267 1 copy.go:60] Got configMap openshift-kube-controller-manager/recycler-config-2 2026-03-18T17:48:12.660422437Z I0318 17:48:12.660127 1 copy.go:60] Got configMap openshift-kube-controller-manager/service-ca-2 2026-03-18T17:48:12.861441036Z I0318 17:48:12.861331 1 copy.go:60] Got configMap openshift-kube-controller-manager/serviceaccount-ca-2 2026-03-18T17:48:13.059891928Z I0318 17:48:13.059798 1 copy.go:52] Failed to get config map openshift-kube-controller-manager/cloud-config-2: configmaps "cloud-config-2" not found 2026-03-18T17:48:13.059891928Z I0318 17:48:13.059847 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token" ... 2026-03-18T17:48:13.060150808Z I0318 17:48:13.060103 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/ca.crt" ... 2026-03-18T17:48:13.060485610Z I0318 17:48:13.060438 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/namespace" ... 2026-03-18T17:48:13.060731850Z I0318 17:48:13.060674 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/token" ... 2026-03-18T17:48:13.060976669Z I0318 17:48:13.060926 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key" ... 2026-03-18T17:48:13.061110484Z I0318 17:48:13.061063 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key/service-account.key" ... 2026-03-18T17:48:13.061404025Z I0318 17:48:13.061349 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert" ... 2026-03-18T17:48:13.061533010Z I0318 17:48:13.061493 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.crt" ... 2026-03-18T17:48:13.061772229Z I0318 17:48:13.061728 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.key" ... 2026-03-18T17:48:13.061984817Z I0318 17:48:13.061944 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config" ... 2026-03-18T17:48:13.062193655Z I0318 17:48:13.062154 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config/config.yaml" ... 2026-03-18T17:48:13.062472535Z I0318 17:48:13.062426 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config" ... 2026-03-18T17:48:13.062609450Z I0318 17:48:13.062569 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config/config.yaml" ... 2026-03-18T17:48:13.062850870Z I0318 17:48:13.062810 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig" ... 2026-03-18T17:48:13.062953474Z I0318 17:48:13.062922 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig/kubeconfig" ... 2026-03-18T17:48:13.063120751Z I0318 17:48:13.063092 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig" ... 2026-03-18T17:48:13.063235685Z I0318 17:48:13.063203 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig" ... 2026-03-18T17:48:13.063481184Z I0318 17:48:13.063444 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod" ... 2026-03-18T17:48:13.063671481Z I0318 17:48:13.063632 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/pod.yaml" ... 2026-03-18T17:48:13.063883619Z I0318 17:48:13.063851 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/version" ... 2026-03-18T17:48:13.064052556Z I0318 17:48:13.064018 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/forceRedeploymentReason" ... 2026-03-18T17:48:13.064202632Z I0318 17:48:13.064172 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config" ... 2026-03-18T17:48:13.064447391Z I0318 17:48:13.064401 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config/recycler-pod.yaml" ... 2026-03-18T17:48:13.064648138Z I0318 17:48:13.064609 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca" ... 2026-03-18T17:48:13.064755932Z I0318 17:48:13.064721 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca/ca-bundle.crt" ... 2026-03-18T17:48:13.064968670Z I0318 17:48:13.064889 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca" ... 2026-03-18T17:48:13.065029093Z I0318 17:48:13.065000 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-03-18T17:48:13.065223160Z I0318 17:48:13.065177 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs" ... 2026-03-18T17:48:13.065364955Z I0318 17:48:13.065328 1 cmd.go:229] Getting secrets ... 2026-03-18T17:48:13.262256528Z I0318 17:48:13.262126 1 copy.go:32] Got secret openshift-kube-controller-manager/csr-signer 2026-03-18T17:48:13.463031417Z I0318 17:48:13.462932 1 copy.go:32] Got secret openshift-kube-controller-manager/kube-controller-manager-client-cert-key 2026-03-18T17:48:13.463031417Z I0318 17:48:13.462994 1 cmd.go:242] Getting config maps ... 2026-03-18T17:48:13.660637716Z I0318 17:48:13.660545 1 copy.go:60] Got configMap openshift-kube-controller-manager/aggregator-client-ca 2026-03-18T17:48:13.860626365Z I0318 17:48:13.860552 1 copy.go:60] Got configMap openshift-kube-controller-manager/client-ca 2026-03-18T17:48:14.074894499Z I0318 17:48:14.074800 1 copy.go:60] Got configMap openshift-kube-controller-manager/trusted-ca-bundle 2026-03-18T17:48:14.075172959Z I0318 17:48:14.075140 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer" ... 2026-03-18T17:48:14.075398648Z I0318 17:48:14.075367 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.crt" ... 2026-03-18T17:48:14.075612696Z I0318 17:48:14.075567 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.key" ... 2026-03-18T17:48:14.075707599Z I0318 17:48:14.075666 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key" ... 2026-03-18T17:48:14.075779472Z I0318 17:48:14.075749 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.crt" ... 2026-03-18T17:48:14.075900527Z I0318 17:48:14.075860 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.key" ... 2026-03-18T17:48:14.076014551Z I0318 17:48:14.075966 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca" ... 2026-03-18T17:48:14.076081864Z I0318 17:48:14.076056 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca/ca-bundle.crt" ... 2026-03-18T17:48:14.076197848Z I0318 17:48:14.076155 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca" ... 2026-03-18T17:48:14.076252460Z I0318 17:48:14.076229 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca/ca-bundle.crt" ... 2026-03-18T17:48:14.076388125Z I0318 17:48:14.076352 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle" ... 2026-03-18T17:48:14.076556531Z I0318 17:48:14.076526 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle/ca-bundle.crt" ... 2026-03-18T17:48:14.077262059Z I0318 17:48:14.077206 1 cmd.go:335] Getting pod configmaps/kube-controller-manager-pod-2 -n openshift-kube-controller-manager 2026-03-18T17:48:14.261524629Z I0318 17:48:14.261403 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-03-18T17:48:14.261524629Z I0318 17:48:14.261490 1 cmd.go:379] Writing a pod under "kube-controller-manager-pod.yaml" key 2026-03-18T17:48:14.261524629Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-cggqt --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-18T17:48:14.266618563Z I0318 17:48:14.266564 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/kube-controller-manager-pod.yaml" ... 2026-03-18T17:48:14.267054829Z I0318 17:48:14.267009 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-18T17:48:14.267054829Z I0318 17:48:14.267028 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-18T17:48:14.267054829Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-cggqt --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715156562607027220 0ustar00000000000000002026-03-18T17:42:30.470334591Z I0318 17:42:30.464765 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc00078f9a0 cert-dir:0xc00078fb80 cert-secrets:0xc00078f900 configmaps:0xc00078f4a0 namespace:0xc00078f2c0 optional-cert-configmaps:0xc00078fae0 optional-cert-secrets:0xc00078fa40 optional-configmaps:0xc00078f5e0 optional-secrets:0xc00078f540 pod:0xc00078f360 pod-manifest-dir:0xc00078f720 resource-dir:0xc00078f680 revision:0xc00078f220 secrets:0xc00078f400 v:0xc0007bd040] [0xc0007bd040 0xc00078f220 0xc00078f2c0 0xc00078f360 0xc00078f680 0xc00078f720 0xc00078f4a0 0xc00078f5e0 0xc00078f400 0xc00078f540 0xc00078fb80 0xc00078f9a0 0xc00078fae0 0xc00078f900 0xc00078fa40] [] map[cert-configmaps:0xc00078f9a0 cert-dir:0xc00078fb80 cert-secrets:0xc00078f900 configmaps:0xc00078f4a0 help:0xc0007bd400 kubeconfig:0xc00078f180 log-flush-frequency:0xc0007bcfa0 namespace:0xc00078f2c0 optional-cert-configmaps:0xc00078fae0 optional-cert-secrets:0xc00078fa40 optional-configmaps:0xc00078f5e0 optional-secrets:0xc00078f540 pod:0xc00078f360 pod-manifest-dir:0xc00078f720 pod-manifests-lock-file:0xc00078f860 resource-dir:0xc00078f680 revision:0xc00078f220 secrets:0xc00078f400 timeout-duration:0xc00078f7c0 v:0xc0007bd040 vmodule:0xc0007bd0e0] [0xc00078f180 0xc00078f220 0xc00078f2c0 0xc00078f360 0xc00078f400 0xc00078f4a0 0xc00078f540 0xc00078f5e0 0xc00078f680 0xc00078f720 0xc00078f7c0 0xc00078f860 0xc00078f900 0xc00078f9a0 0xc00078fa40 0xc00078fae0 0xc00078fb80 0xc0007bcfa0 0xc0007bd040 0xc0007bd0e0 0xc0007bd400] [0xc00078f9a0 0xc00078fb80 0xc00078f900 0xc00078f4a0 0xc0007bd400 0xc00078f180 0xc0007bcfa0 0xc00078f2c0 0xc00078fae0 0xc00078fa40 0xc00078f5e0 0xc00078f540 0xc00078f360 0xc00078f720 0xc00078f860 0xc00078f680 0xc00078f220 0xc00078f400 0xc00078f7c0 0xc0007bd040 0xc0007bd0e0] map[104:0xc0007bd400 118:0xc0007bd040] [] -1 0 0xc00078a390 true 0xae2140 []} 2026-03-18T17:42:30.470334591Z I0318 17:42:30.465822 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0001c69c0)({ 2026-03-18T17:42:30.470334591Z KubeConfig: (string) "", 2026-03-18T17:42:30.470334591Z KubeClient: (kubernetes.Interface) , 2026-03-18T17:42:30.470334591Z Revision: (string) (len=1) "1", 2026-03-18T17:42:30.470334591Z NodeName: (string) "", 2026-03-18T17:42:30.470334591Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-18T17:42:30.470334591Z Clock: (clock.RealClock) { 2026-03-18T17:42:30.470334591Z }, 2026-03-18T17:42:30.470334591Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-18T17:42:30.470334591Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-18T17:42:30.470334591Z (string) (len=11) "etcd-client", 2026-03-18T17:42:30.470334591Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-18T17:42:30.470334591Z (string) (len=31) "localhost-recovery-client-token" 2026-03-18T17:42:30.470334591Z }, 2026-03-18T17:42:30.470334591Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-18T17:42:30.470334591Z (string) (len=17) "encryption-config", 2026-03-18T17:42:30.470334591Z (string) (len=21) "webhook-authenticator" 2026-03-18T17:42:30.470334591Z }, 2026-03-18T17:42:30.470334591Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-18T17:42:30.470334591Z (string) (len=18) "kube-apiserver-pod", 2026-03-18T17:42:30.470334591Z (string) (len=6) "config", 2026-03-18T17:42:30.470334591Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-18T17:42:30.470334591Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-18T17:42:30.470334591Z (string) (len=15) "etcd-serving-ca", 2026-03-18T17:42:30.470334591Z (string) (len=18) "kubelet-serving-ca", 2026-03-18T17:42:30.470334591Z (string) (len=22) "sa-token-signing-certs", 2026-03-18T17:42:30.470334591Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-18T17:42:30.470334591Z }, 2026-03-18T17:42:30.470334591Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-18T17:42:30.470334591Z (string) (len=14) "oauth-metadata", 2026-03-18T17:42:30.470334591Z (string) (len=12) "cloud-config", 2026-03-18T17:42:30.470334591Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-18T17:42:30.470334591Z }, 2026-03-18T17:42:30.470334591Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-18T17:42:30.470334591Z (string) (len=17) "aggregator-client", 2026-03-18T17:42:30.470334591Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-18T17:42:30.470334591Z (string) (len=31) "service-network-serving-certkey", 2026-03-18T17:42:30.470334591Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-18T17:42:30.470334591Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-18T17:42:30.470334591Z (string) (len=33) "bound-service-account-signing-key", 2026-03-18T17:42:30.470334591Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-18T17:42:30.470334591Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-18T17:42:30.470334591Z (string) (len=14) "kubelet-client", 2026-03-18T17:42:30.470334591Z (string) (len=16) "node-kubeconfigs" 2026-03-18T17:42:30.470334591Z }, 2026-03-18T17:42:30.470334591Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-18T17:42:30.470334591Z (string) (len=17) "user-serving-cert", 2026-03-18T17:42:30.470334591Z (string) (len=21) "user-serving-cert-000", 2026-03-18T17:42:30.470334591Z (string) (len=21) "user-serving-cert-001", 2026-03-18T17:42:30.470334591Z (string) (len=21) "user-serving-cert-002", 2026-03-18T17:42:30.470334591Z (string) (len=21) "user-serving-cert-003", 2026-03-18T17:42:30.470334591Z (string) (len=21) "user-serving-cert-004", 2026-03-18T17:42:30.470334591Z (string) (len=21) "user-serving-cert-005", 2026-03-18T17:42:30.470334591Z (string) (len=21) "user-serving-cert-006", 2026-03-18T17:42:30.470334591Z (string) (len=21) "user-serving-cert-007", 2026-03-18T17:42:30.470334591Z (string) (len=21) "user-serving-cert-008", 2026-03-18T17:42:30.470334591Z (string) (len=21) "user-serving-cert-009" 2026-03-18T17:42:30.470334591Z }, 2026-03-18T17:42:30.470334591Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-18T17:42:30.470334591Z (string) (len=20) "aggregator-client-ca", 2026-03-18T17:42:30.470334591Z (string) (len=9) "client-ca", 2026-03-18T17:42:30.470334591Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-18T17:42:30.470334591Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-18T17:42:30.470334591Z }, 2026-03-18T17:42:30.470334591Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T17:42:30.470334591Z (string) (len=17) "trusted-ca-bundle" 2026-03-18T17:42:30.470334591Z }, 2026-03-18T17:42:30.470334591Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-18T17:42:30.470334591Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T17:42:30.470334591Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T17:42:30.470334591Z Timeout: (time.Duration) 2m0s, 2026-03-18T17:42:30.470334591Z StaticPodManifestsLockFile: (string) "", 2026-03-18T17:42:30.470334591Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T17:42:30.470334591Z KubeletVersion: (string) "" 2026-03-18T17:42:30.470334591Z }) 2026-03-18T17:42:30.537551291Z I0318 17:42:30.537478 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T17:42:30.555150758Z I0318 17:42:30.554868 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T17:42:30.555150758Z I0318 17:42:30.554940 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T17:42:30.555150758Z I0318 17:42:30.554951 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T17:42:30.566568929Z I0318 17:42:30.566520 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-18T17:43:00.567650022Z I0318 17:43:00.567542 1 cmd.go:524] Getting installer pods for node master-0 2026-03-18T17:43:14.571570015Z F0318 17:43:14.571471 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115156562607022700 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"41191498-89c5-44dc-b648-dbea889c72f5","resourceVersion":"9087","creationTimestamp":"2026-03-18T17:42:27Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.46/23\"],\"mac_address\":\"0a:58:0a:80:00:2e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.46/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.46\"\n ],\n \"mac\": \"0a:58:0a:80:00:2e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"bb3fc685-9a1d-4603-93b5-8a3b7aa4f1da"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:43:16Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:27Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:43:15Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:43:15Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:27Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.46","podIPs":[{"ip":"10.128.0.46"}],"startTime":"2026-03-18T17:42:27Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0318 17:42:30.537478 1 cmd.go:413] Getting controller reference for node master-0\nI0318 17:42:30.554868 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0318 17:42:30.554940 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0318 17:42:30.554951 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0318 17:42:30.566520 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0318 17:43:00.567542 1 cmd.go:524] Getting installer pods for node master-0\nF0318 17:43:14.571471 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-18T17:42:29Z","finishedAt":"2026-03-18T17:43:14Z","containerID":"cri-o://952d444a3fc2166b6fd7ae2111af2db0a2310710ae00c917ceccc2b70b6b3ce3"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://952d444a3fc2166b6fd7ae2111af2db0a2310710ae00c917ceccc2b70b6b3ce3","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615156562607036000 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-18T17:39:57.307705143Z I0318 17:39:57.307265 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010350715156562607032676 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-18T17:48:45.078019425Z Trace[403656944]: ---"About to write a response" 541ms (17:48:45.077) 2026-03-18T17:48:45.078019425Z Trace[403656944]: [541.218868ms] [541.218868ms] END 2026-03-18T17:48:45.078296722Z I0318 17:48:45.078218 1 trace.go:236] Trace[1867875472]: "Update" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:02501cb8-0c66-489c-b237-90cab9d368bd,client:192.168.32.10,api-group:,api-version:v1,name:network-check-source-b4bf74f6-nlqpp,subresource:status,namespace:openshift-network-diagnostics,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-network-diagnostics/pods/network-check-source-b4bf74f6-nlqpp/status,user-agent:multus-daemon/v0.0.0 (linux/amd64) kubernetes/$Format,verb:PUT (18-Mar-2026 17:48:44.422) (total time: 655ms): 2026-03-18T17:48:45.078296722Z Trace[1867875472]: ["GuaranteedUpdate etcd3" audit-id:02501cb8-0c66-489c-b237-90cab9d368bd,key:/pods/openshift-network-diagnostics/network-check-source-b4bf74f6-nlqpp,type:*core.Pod,resource:pods 655ms (17:48:44.422) 2026-03-18T17:48:45.078296722Z Trace[1867875472]: ---"Txn call completed" 646ms (17:48:45.077)] 2026-03-18T17:48:45.078296722Z Trace[1867875472]: ---"Write to database call succeeded" len:5332 647ms (17:48:45.077) 2026-03-18T17:48:45.078296722Z Trace[1867875472]: [655.580656ms] [655.580656ms] END 2026-03-18T17:48:45.080423842Z I0318 17:48:45.080361 1 trace.go:236] Trace[875327830]: "List" accept:application/json,audit-id:a8816386-48ab-468f-9377-82f9210c2786,client:10.128.0.68,api-group:operators.coreos.com,api-version:v1alpha1,name:,subresource:,namespace:openshift-kube-controller-manager-operator,protocol:HTTP/2.0,resource:installplans,scope:namespace,url:/apis/operators.coreos.com/v1alpha1/namespaces/openshift-kube-controller-manager-operator/installplans,user-agent:insights-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:LIST (18-Mar-2026 17:48:44.427) (total time: 652ms): 2026-03-18T17:48:45.080423842Z Trace[875327830]: ["List(recursive=false) etcd3" audit-id:a8816386-48ab-468f-9377-82f9210c2786,key:/operators.coreos.com/installplans,resourceVersion:,resourceVersionMatch:,limit:1,continue: 652ms (17:48:44.427)] 2026-03-18T17:48:45.080423842Z Trace[875327830]: [652.86717ms] [652.86717ms] END 2026-03-18T17:48:45.081358688Z I0318 17:48:45.080360 1 trace.go:236] Trace[852474298]: "List" accept:application/json, */*,audit-id:19fe9f47-56cb-48c7-8657-9653ade602ae,client:10.128.0.27,api-group:admissionregistration.k8s.io,api-version:v1,name:,subresource:,namespace:,protocol:HTTP/2.0,resource:validatingwebhookconfigurations,scope:cluster,url:/apis/admissionregistration.k8s.io/v1/validatingwebhookconfigurations,user-agent:olm/v0.0.0 (linux/amd64) kubernetes/$Format,verb:LIST (18-Mar-2026 17:48:44.435) (total time: 644ms): 2026-03-18T17:48:45.081358688Z Trace[852474298]: ["List(recursive=false) etcd3" audit-id:19fe9f47-56cb-48c7-8657-9653ade602ae,key:/validatingwebhookconfigurations,resourceVersion:,resourceVersionMatch:,limit:1,continue: 644ms (17:48:44.436)] 2026-03-18T17:48:45.081358688Z Trace[852474298]: [644.291949ms] [644.291949ms] END 2026-03-18T17:48:45.081358688Z I0318 17:48:45.080807 1 trace.go:236] Trace[2050309597]: "List" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:18859276-fb26-4608-954f-651b38cee842,client:10.128.0.68,api-group:,api-version:v1,name:,subresource:,namespace:openshift-kni-infra,protocol:HTTP/2.0,resource:serviceaccounts,scope:namespace,url:/api/v1/namespaces/openshift-kni-infra/serviceaccounts,user-agent:insights-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:LIST (18-Mar-2026 17:48:44.427) (total time: 652ms): 2026-03-18T17:48:45.081358688Z Trace[2050309597]: ["List(recursive=false) etcd3" audit-id:18859276-fb26-4608-954f-651b38cee842,key:/serviceaccounts,resourceVersion:,resourceVersionMatch:,limit:1,continue: 652ms (17:48:44.428)] 2026-03-18T17:48:45.081358688Z Trace[2050309597]: [652.802478ms] [652.802478ms] END 2026-03-18T17:48:45.083553660Z I0318 17:48:45.083500 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.084102865Z I0318 17:48:45.084059 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.086109041Z I0318 17:48:45.084119 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.087541691Z I0318 17:48:45.087478 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.087877860Z I0318 17:48:45.087823 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.091667108Z I0318 17:48:45.091574 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.092737587Z I0318 17:48:45.092655 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.096186614Z I0318 17:48:45.096110 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.096250905Z I0318 17:48:45.096189 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.106595336Z I0318 17:48:45.106540 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.181206349Z I0318 17:48:45.181137 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.181462436Z I0318 17:48:45.181418 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.181462436Z I0318 17:48:45.181334 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.187798533Z I0318 17:48:45.187715 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.280112523Z I0318 17:48:45.280025 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.284717322Z I0318 17:48:45.284661 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.284768384Z I0318 17:48:45.284723 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.333441918Z I0318 17:48:45.333358 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.380957511Z I0318 17:48:45.380845 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.384305524Z I0318 17:48:45.383927 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.388304777Z I0318 17:48:45.383933 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.388304777Z I0318 17:48:45.387102 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.388304777Z I0318 17:48:45.387729 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.533227571Z I0318 17:48:45.533136 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.533308933Z I0318 17:48:45.533254 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.538435497Z I0318 17:48:45.538341 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=8 seatDemandAvg=0.16374357802254824 seatDemandStdev=0.5538123491562225 seatDemandSmoothed=20.326917408094126 fairFrac=2.331974373907979 currentCL=8 concurrencyDenominator=8 backstop=false 2026-03-18T17:48:45.560319551Z I0318 17:48:45.560012 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.731544103Z I0318 17:48:45.731467 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.733180829Z I0318 17:48:45.732935 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.758246832Z I0318 17:48:45.758190 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.930891563Z I0318 17:48:45.930810 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.932059286Z I0318 17:48:45.931996 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:45.958648971Z I0318 17:48:45.958596 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.131884520Z I0318 17:48:46.131797 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.132684492Z I0318 17:48:46.132112 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.158338131Z I0318 17:48:46.158260 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.330585692Z I0318 17:48:46.330523 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.332570778Z I0318 17:48:46.332514 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.358683930Z I0318 17:48:46.358627 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.530577831Z I0318 17:48:46.530503 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.531513737Z I0318 17:48:46.531481 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.558152934Z I0318 17:48:46.558057 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.729899951Z I0318 17:48:46.729822 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.732209215Z I0318 17:48:46.732162 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.758697328Z I0318 17:48:46.758629 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.930150246Z I0318 17:48:46.930003 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.931947417Z I0318 17:48:46.931863 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:46.958449750Z I0318 17:48:46.958376 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.130142625Z I0318 17:48:47.130075 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.132587813Z I0318 17:48:47.132537 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.158218482Z I0318 17:48:47.158138 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.331212034Z I0318 17:48:47.331135 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.332709966Z I0318 17:48:47.332645 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.358044416Z I0318 17:48:47.357915 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.530580464Z I0318 17:48:47.530467 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.532469638Z I0318 17:48:47.532377 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.557775697Z I0318 17:48:47.557687 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.735081419Z I0318 17:48:47.734943 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.735312366Z I0318 17:48:47.735198 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.759584227Z I0318 17:48:47.759440 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.934400299Z I0318 17:48:47.930536 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.934400299Z I0318 17:48:47.932209 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:47.958962168Z I0318 17:48:47.958898 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.132203787Z I0318 17:48:48.132125 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.132203787Z I0318 17:48:48.132153 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.157875306Z I0318 17:48:48.157815 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.331180757Z I0318 17:48:48.331094 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.332515295Z I0318 17:48:48.332479 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.359142891Z I0318 17:48:48.359032 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.530172987Z I0318 17:48:48.530082 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.531663980Z I0318 17:48:48.531587 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.557885115Z I0318 17:48:48.557807 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.730791474Z I0318 17:48:48.730689 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.732406699Z I0318 17:48:48.732339 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.758773089Z I0318 17:48:48.758670 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.930789392Z I0318 17:48:48.930718 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.933905749Z I0318 17:48:48.933858 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:48.957730208Z I0318 17:48:48.957665 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:49.130882704Z I0318 17:48:49.130809 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:49.132304314Z I0318 17:48:49.132204 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:49.330613065Z I0318 17:48:49.330521 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:49.332260911Z I0318 17:48:49.332108 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:49.530670605Z I0318 17:48:49.530610 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T17:48:49.532959980Z I0318 17:48:49.532906 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015156562607031160 0ustar00000000000000002026-03-18T17:39:53.041775437Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115156562607036724 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-p72m22026-03-18T17:48:12.432456342Z I0318 17:48:12.432204 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:48:12.432456342Z I0318 17:48:12.432407 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:48:12.433135857Z I0318 17:48:12.433090 1 observer_polling.go:159] Starting file observer 2026-03-18T17:48:12.453151260Z I0318 17:48:12.453078 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-18T17:48:12.790568215Z I0318 17:48:12.790471 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T17:48:12.790568215Z W0318 17:48:12.790548 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:12.790626548Z W0318 17:48:12.790563 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:12.790626548Z W0318 17:48:12.790578 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T17:48:12.790626548Z W0318 17:48:12.790588 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T17:48:12.790626548Z W0318 17:48:12.790598 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T17:48:12.790626548Z W0318 17:48:12.790609 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T17:48:12.792500869Z I0318 17:48:12.792447 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T17:48:12.792853443Z I0318 17:48:12.792818 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-03-18T17:48:12.796530873Z I0318 17:48:12.796346 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T17:48:12.796530873Z I0318 17:48:12.796418 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T17:48:12.796530873Z I0318 17:48:12.796465 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T17:48:12.796530873Z I0318 17:48:12.796485 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T17:48:12.796530873Z I0318 17:48:12.796519 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T17:48:12.796566205Z I0318 17:48:12.796528 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:12.797198609Z I0318 17:48:12.797137 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T17:48:12.797520511Z I0318 17:48:12.797401 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T17:48:12.797520511Z I0318 17:48:12.797427 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T17:48:12.896727680Z I0318 17:48:12.896622 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:12.896727680Z I0318 17:48:12.896665 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T17:48:12.896727680Z I0318 17:48:12.896682 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-apiserver-operator_previous.log0000640000000000000000000000242515156562607037123 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-p72m22026-03-18T17:46:16.559814539Z I0318 17:46:16.559403 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:46:16.559814539Z I0318 17:46:16.559524 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:46:16.560147557Z I0318 17:46:16.560105 1 observer_polling.go:159] Starting file observer 2026-03-18T17:47:16.567019117Z W0318 17:47:16.566876 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-apiserver-operator-8b68b9d9b-p72m2) 2026-03-18T17:47:16.567197262Z I0318 17:47:16.567161 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-18T17:47:47.097672221Z F0318 17:47:47.097581 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-apiserver-operator/leases/kube-apiserver-operator-lock": context deadline exceeded config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-p72m2.json0000640000000000000000000001600215156562607027711 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-8b68b9d9b-p72m2","generateName":"kube-apiserver-operator-8b68b9d9b-","namespace":"openshift-kube-apiserver-operator","uid":"26575d68-0488-4dfa-a5d0-5016e481dba6","resourceVersion":"9633","creationTimestamp":"2026-03-18T17:40:18Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"8b68b9d9b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.26/23\"],\"mac_address\":\"0a:58:0a:80:00:1a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.26/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.26\"\n ],\n \"mac\": \"0a:58:0a:80:00:1a\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-8b68b9d9b","uid":"c4f0dc13-e4ce-407a-866e-cea6fdac0080","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:12Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:12Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.26","podIPs":[{"ip":"10.128.0.26"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-18T17:48:12Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 17:46:16.559403 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 17:46:16.559524 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 17:46:16.560105 1 observer_polling.go:159] Starting file observer\nW0318 17:47:16.566876 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-apiserver-operator-8b68b9d9b-p72m2)\nI0318 17:47:16.567161 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5\nF0318 17:47:47.097581 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-apiserver-operator/leases/kube-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-18T17:46:16Z","finishedAt":"2026-03-18T17:47:47Z","containerID":"cri-o://6469fb4bb68705329572e917ffd53c8d7d98a360f3801392b01dd10ca152c1c0"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://2206a7113dacde21996d9057f09cbc9465ab1858bcc433f5c546151c4ea00afa","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007425015156562607025217 0ustar00000000000000002026-03-18T17:42:54.157642804Z cluster-etcd-operator rev \ 2026-03-18T17:42:54.157642804Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-18T17:42:54.157642804Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-18T17:42:54.157642804Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-18T17:42:54.157642804Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-18T17:42:54.157642804Z securityContext: 2026-03-18T17:42:54.157642804Z privileged: true 2026-03-18T17:42:54.157642804Z resources: 2026-03-18T17:42:54.157642804Z requests: 2026-03-18T17:42:54.157642804Z memory: 50Mi 2026-03-18T17:42:54.157642804Z cpu: 10m 2026-03-18T17:42:54.157642804Z env: 2026-03-18T17:42:54.157642804Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-18T17:42:54.157642804Z value: "https://192.168.32.10:2379" 2026-03-18T17:42:54.157642804Z - name: "ETCDCTL_API" 2026-03-18T17:42:54.157642804Z value: "3" 2026-03-18T17:42:54.157642804Z - name: "ETCDCTL_CACERT" 2026-03-18T17:42:54.157642804Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-18T17:42:54.157642804Z - name: "ETCDCTL_CERT" 2026-03-18T17:42:54.157642804Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-18T17:42:54.157642804Z - name: "ETCDCTL_ENDPOINTS" 2026-03-18T17:42:54.157642804Z value: "https://192.168.32.10:2379" 2026-03-18T17:42:54.157642804Z - name: "ETCDCTL_KEY" 2026-03-18T17:42:54.157642804Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-18T17:42:54.157642804Z - name: "ETCD_CIPHER_SUITES" 2026-03-18T17:42:54.157642804Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-18T17:42:54.157642804Z - name: "ETCD_DATA_DIR" 2026-03-18T17:42:54.157642804Z value: "/var/lib/etcd" 2026-03-18T17:42:54.157642804Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-18T17:42:54.157642804Z value: "2500" 2026-03-18T17:42:54.157642804Z - name: "ETCD_ENABLE_PPROF" 2026-03-18T17:42:54.157642804Z value: "true" 2026-03-18T17:42:54.157642804Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-18T17:42:54.157642804Z value: "1" 2026-03-18T17:42:54.157642804Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-18T17:42:54.157733196Z value: "200ms" 2026-03-18T17:42:54.157733196Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-18T17:42:54.157733196Z value: "5s" 2026-03-18T17:42:54.157733196Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-18T17:42:54.157733196Z value: "500" 2026-03-18T17:42:54.157733196Z - name: "ETCD_IMAGE" 2026-03-18T17:42:54.157733196Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278" 2026-03-18T17:42:54.157733196Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-18T17:42:54.157733196Z value: "existing" 2026-03-18T17:42:54.157733196Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-18T17:42:54.157733196Z value: "8589934592" 2026-03-18T17:42:54.157733196Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-18T17:42:54.157733196Z value: "true" 2026-03-18T17:42:54.157733196Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-18T17:42:54.157733196Z value: "TLS1.2" 2026-03-18T17:42:54.157733196Z - name: "NODE_master_0_ETCD_NAME" 2026-03-18T17:42:54.157733196Z value: "master-0" 2026-03-18T17:42:54.157733196Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-18T17:42:54.157733196Z value: "192.168.32.10" 2026-03-18T17:42:54.157733196Z - name: "NODE_master_0_IP" 2026-03-18T17:42:54.157733196Z value: "192.168.32.10" 2026-03-18T17:42:54.157733196Z volumeMounts: 2026-03-18T17:42:54.157733196Z - mountPath: /var/lib/etcd 2026-03-18T17:42:54.157733196Z name: data-dir 2026-03-18T17:42:54.157733196Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-18T17:42:54.157733196Z name: cert-dir 2026-03-18T17:42:54.157733196Z hostNetwork: true 2026-03-18T17:42:54.157733196Z priority: 2000001000 2026-03-18T17:42:54.157733196Z priorityClassName: system-node-critical 2026-03-18T17:42:54.157733196Z tolerations: 2026-03-18T17:42:54.157733196Z - operator: "Exists" 2026-03-18T17:42:54.157733196Z volumes: 2026-03-18T17:42:54.157733196Z - hostPath: 2026-03-18T17:42:54.157733196Z path: /etc/kubernetes/manifests 2026-03-18T17:42:54.157733196Z name: static-pod-dir 2026-03-18T17:42:54.157733196Z - hostPath: 2026-03-18T17:42:54.157733196Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-18T17:42:54.157733196Z name: resource-dir 2026-03-18T17:42:54.157733196Z - hostPath: 2026-03-18T17:42:54.157733196Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-18T17:42:54.157733196Z name: cert-dir 2026-03-18T17:42:54.157733196Z - hostPath: 2026-03-18T17:42:54.157733196Z path: /var/lib/etcd 2026-03-18T17:42:54.157733196Z type: "" 2026-03-18T17:42:54.157733196Z name: data-dir 2026-03-18T17:42:54.157733196Z - hostPath: 2026-03-18T17:42:54.157733196Z path: /usr/local/bin 2026-03-18T17:42:54.157733196Z name: usr-local-bin 2026-03-18T17:42:54.157733196Z - hostPath: 2026-03-18T17:42:54.157733196Z path: /var/log/etcd 2026-03-18T17:42:54.157733196Z name: log-dir 2026-03-18T17:42:54.157733196Z - hostPath: 2026-03-18T17:42:54.157733196Z path: /etc/kubernetes 2026-03-18T17:42:54.157733196Z name: config-dir 2026-03-18T17:42:54.157733196Z - hostPath: 2026-03-18T17:42:54.157733196Z path: /var/lib/etcd-auto-backup 2026-03-18T17:42:54.157733196Z name: etcd-auto-backup-dir 2026-03-18T17:42:54.238247628Z I0318 17:42:54.238150 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-18T17:42:54.238477733Z I0318 17:42:54.238443 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-18T17:42:54.238477733Z I0318 17:42:54.238456 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-18T17:42:54.238477733Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-18T17:43:08.356559033Z W0318 17:43:08.356193 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.189e006daa4a1cc4.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:08451d5b-cf84-45a1-a16d-7ce10a83a6e7,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-03-18 17:42:54.238973124 +0000 UTC m=+31.000878679,LastTimestamp:2026-03-18 17:42:54.238973124 +0000 UTC m=+31.000878679,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: the server was unable to return a response in the time allotted, but may still be processing the request (post events) config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615156562607023511 0ustar00000000000000002026-03-18T17:46:07.062523304Z I0318 17:46:07.062015 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215156562607024206 0ustar00000000000000002026-03-18T17:45:56.747068162Z I0318 17:45:56.746728 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-03-18T17:47:27.291029149Z I0318 17:47:27.290881 1 etcdcli_pool.go:70] creating a new cached client 2026-03-18T17:47:42.290268704Z I0318 17:47:42.290194 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615156562607024365 0ustar00000000000000002026-03-18T17:45:56.403859667Z {"level":"info","ts":"2026-03-18T17:45:56.403559Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-18T17:45:56.404445071Z {"level":"info","ts":"2026-03-18T17:45:56.404389Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-03-18T17:45:56.404656936Z {"level":"info","ts":"2026-03-18T17:45:56.404610Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-18T17:45:56.404757458Z {"level":"info","ts":"2026-03-18T17:45:56.404694Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-03-18T17:45:56.404773888Z {"level":"info","ts":"2026-03-18T17:45:56.404753Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc00021e000/192.168.32.10:9978\""} 2026-03-18T17:45:56.404789469Z {"level":"info","ts":"2026-03-18T17:45:56.404776Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc00021e000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-03-18T17:45:56.404804959Z {"level":"info","ts":"2026-03-18T17:45:56.404787Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-03-18T17:45:56.405118708Z {"level":"info","ts":"2026-03-18T17:45:56.405053Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-03-18T17:45:56.405146838Z {"level":"info","ts":"2026-03-18T17:45:56.405110Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-03-18T17:45:56.405264331Z {"level":"info","ts":"2026-03-18T17:45:56.405181Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc00007f6c0 } }"} 2026-03-18T17:45:56.405264331Z {"level":"info","ts":"2026-03-18T17:45:56.405209Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-03-18T17:45:56.405309852Z {"level":"info","ts":"2026-03-18T17:45:56.405238Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-03-18T17:45:56.405309852Z {"level":"info","ts":"2026-03-18T17:45:56.405289Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-03-18T17:45:56.405550178Z {"level":"info","ts":"2026-03-18T17:45:56.405383Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T17:45:56.405577269Z {"level":"info","ts":"2026-03-18T17:45:56.405536Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T17:45:56.406804728Z {"level":"info","ts":"2026-03-18T17:45:56.406707Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, CONNECTING"} 2026-03-18T17:45:56.407082124Z {"level":"info","ts":"2026-03-18T17:45:56.406964Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:45:56.407209507Z {"level":"warn","ts":"2026-03-18T17:45:56.407101Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:45:56.407343321Z {"level":"info","ts":"2026-03-18T17:45:56.407211Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:45:56.407439083Z {"level":"info","ts":"2026-03-18T17:45:56.407370Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, TRANSIENT_FAILURE"} 2026-03-18T17:45:56.407462123Z {"level":"info","ts":"2026-03-18T17:45:56.407423Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-03-18T17:45:56.407526775Z {"level":"info","ts":"2026-03-18T17:45:56.407417Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-03-18T17:45:56.409112394Z {"level":"info","ts":"2026-03-18T17:45:56.409011Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-03-18T17:45:56.409733239Z {"level":"info","ts":"2026-03-18T17:45:56.409635Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-03-18T17:45:56.409733239Z {"level":"info","ts":"2026-03-18T17:45:56.409692Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-03-18T17:45:56.409733239Z {"level":"info","ts":"2026-03-18T17:45:56.409713Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-18T17:45:56.409773030Z {"level":"info","ts":"2026-03-18T17:45:56.409728Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-18T17:45:56.410135948Z {"level":"info","ts":"2026-03-18T17:45:56.410054Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-03-18T17:45:57.407642855Z {"level":"info","ts":"2026-03-18T17:45:57.407530Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:45:57.407642855Z {"level":"info","ts":"2026-03-18T17:45:57.407595Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, IDLE"} 2026-03-18T17:45:57.407716187Z {"level":"info","ts":"2026-03-18T17:45:57.407635Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T17:45:57.407716187Z {"level":"info","ts":"2026-03-18T17:45:57.407667Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T17:45:57.407826119Z {"level":"info","ts":"2026-03-18T17:45:57.407775Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, CONNECTING"} 2026-03-18T17:45:57.408301561Z {"level":"info","ts":"2026-03-18T17:45:57.408205Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:45:57.408424164Z {"level":"warn","ts":"2026-03-18T17:45:57.408379Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:45:57.408480106Z {"level":"info","ts":"2026-03-18T17:45:57.408442Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:45:57.408523377Z {"level":"info","ts":"2026-03-18T17:45:57.408502Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, TRANSIENT_FAILURE"} 2026-03-18T17:45:59.056499753Z {"level":"info","ts":"2026-03-18T17:45:59.056374Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:45:59.056499753Z {"level":"info","ts":"2026-03-18T17:45:59.056459Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, IDLE"} 2026-03-18T17:45:59.056567124Z {"level":"info","ts":"2026-03-18T17:45:59.056509Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T17:45:59.056567124Z {"level":"info","ts":"2026-03-18T17:45:59.056548Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T17:45:59.056737158Z {"level":"info","ts":"2026-03-18T17:45:59.056682Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, CONNECTING"} 2026-03-18T17:45:59.057183609Z {"level":"info","ts":"2026-03-18T17:45:59.056981Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:45:59.057183609Z {"level":"warn","ts":"2026-03-18T17:45:59.057043Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:45:59.057183609Z {"level":"info","ts":"2026-03-18T17:45:59.057085Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:45:59.057183609Z {"level":"info","ts":"2026-03-18T17:45:59.057127Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, TRANSIENT_FAILURE"} 2026-03-18T17:46:01.160468012Z {"level":"info","ts":"2026-03-18T17:46:01.160351Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:46:01.160468012Z {"level":"info","ts":"2026-03-18T17:46:01.160422Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, IDLE"} 2026-03-18T17:46:01.160524584Z {"level":"info","ts":"2026-03-18T17:46:01.160454Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T17:46:01.160524584Z {"level":"info","ts":"2026-03-18T17:46:01.160479Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T17:46:01.160703798Z {"level":"info","ts":"2026-03-18T17:46:01.160626Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, CONNECTING"} 2026-03-18T17:46:01.160967004Z {"level":"info","ts":"2026-03-18T17:46:01.160916Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:46:01.161018535Z {"level":"warn","ts":"2026-03-18T17:46:01.160997Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:46:01.161075307Z {"level":"info","ts":"2026-03-18T17:46:01.161056Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:46:01.161144688Z {"level":"info","ts":"2026-03-18T17:46:01.161126Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, TRANSIENT_FAILURE"} 2026-03-18T17:46:05.170591976Z {"level":"info","ts":"2026-03-18T17:46:05.170427Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T17:46:05.170591976Z {"level":"info","ts":"2026-03-18T17:46:05.170516Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, IDLE"} 2026-03-18T17:46:05.170663797Z {"level":"info","ts":"2026-03-18T17:46:05.170561Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T17:46:05.170663797Z {"level":"info","ts":"2026-03-18T17:46:05.170600Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T17:46:05.170840342Z {"level":"info","ts":"2026-03-18T17:46:05.170764Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, CONNECTING"} 2026-03-18T17:46:05.181022247Z {"level":"info","ts":"2026-03-18T17:46:05.180939Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-03-18T17:46:05.181061138Z {"level":"info","ts":"2026-03-18T17:46:05.181018Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0002d03f0, READY"} 2026-03-18T17:46:05.181130040Z {"level":"info","ts":"2026-03-18T17:46:05.181093Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-03-18T17:46:05.181147530Z {"level":"info","ts":"2026-03-18T17:46:05.181130Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013354515156562607022730 0ustar00000000000000002026-03-18T17:48:44.409615669Z {"level":"warn","ts":"2026-03-18T17:48:44.409536Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:43.938071Z","time spent":"471.460751ms","remote":"[::1]:40312","response type":"/etcdserverpb.KV/Range","request count":0,"request size":79,"response count":1,"response size":6539,"request content":"key:\"/kubernetes.io/deployments/openshift-cluster-version/cluster-version-operator\" "} 2026-03-18T17:48:44.409615669Z {"level":"warn","ts":"2026-03-18T17:48:44.409128Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"270.398942ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-authentication-operator/service-ca-bundle\" ","response":"range_response_count:1 size:2645"} 2026-03-18T17:48:44.409615669Z {"level":"info","ts":"2026-03-18T17:48:44.409537Z","caller":"traceutil/trace.go:171","msg":"trace[293709466] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-etcd-operator/etcd-ca-bundle; range_end:; response_count:1; response_revision:10311; }","duration":"246.588035ms","start":"2026-03-18T17:48:44.162935Z","end":"2026-03-18T17:48:44.409523Z","steps":["trace[293709466] 'agreement among raft nodes before linearized reading' (duration: 246.128142ms)"],"step_count":1} 2026-03-18T17:48:44.409615669Z {"level":"info","ts":"2026-03-18T17:48:44.409566Z","caller":"traceutil/trace.go:171","msg":"trace[484070821] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator; range_end:; response_count:1; response_revision:10311; }","duration":"121.305181ms","start":"2026-03-18T17:48:44.288254Z","end":"2026-03-18T17:48:44.409559Z","steps":["trace[484070821] 'agreement among raft nodes before linearized reading' (duration: 121.286331ms)"],"step_count":1} 2026-03-18T17:48:44.409733082Z {"level":"info","ts":"2026-03-18T17:48:44.409661Z","caller":"traceutil/trace.go:171","msg":"trace[2083023577] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-controller-manager/openshift-controller-manager; range_end:; response_count:1; response_revision:10311; }","duration":"146.57755ms","start":"2026-03-18T17:48:44.263079Z","end":"2026-03-18T17:48:44.409656Z","steps":["trace[2083023577] 'agreement among raft nodes before linearized reading' (duration: 146.559269ms)"],"step_count":1} 2026-03-18T17:48:44.409733082Z {"level":"warn","ts":"2026-03-18T17:48:44.409683Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"496.977807ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolequickstarts.console.openshift.io\" ","response":"range_response_count:1 size:12675"} 2026-03-18T17:48:44.409733082Z {"level":"info","ts":"2026-03-18T17:48:44.409708Z","caller":"traceutil/trace.go:171","msg":"trace[1273201918] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolequickstarts.console.openshift.io; range_end:; response_count:1; response_revision:10311; }","duration":"497.024398ms","start":"2026-03-18T17:48:43.912677Z","end":"2026-03-18T17:48:44.409701Z","steps":["trace[1273201918] 'agreement among raft nodes before linearized reading' (duration: 496.971207ms)"],"step_count":1} 2026-03-18T17:48:44.409754053Z {"level":"warn","ts":"2026-03-18T17:48:44.409729Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:43.912661Z","time spent":"497.06309ms","remote":"[::1]:40382","response type":"/etcdserverpb.KV/Range","request count":0,"request size":103,"response count":1,"response size":12699,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolequickstarts.console.openshift.io\" "} 2026-03-18T17:48:44.409769843Z {"level":"warn","ts":"2026-03-18T17:48:44.409726Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"971.462163ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-cluster-node-tuning-operator/trusted-ca\" ","response":"range_response_count:1 size:225303"} 2026-03-18T17:48:44.409915637Z {"level":"info","ts":"2026-03-18T17:48:44.409565Z","caller":"traceutil/trace.go:171","msg":"trace[1612915563] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-authentication-operator/service-ca-bundle; range_end:; response_count:1; response_revision:10311; }","duration":"270.902736ms","start":"2026-03-18T17:48:44.138654Z","end":"2026-03-18T17:48:44.409557Z","steps":["trace[1612915563] 'agreement among raft nodes before linearized reading' (duration: 270.448434ms)"],"step_count":1} 2026-03-18T17:48:44.409915637Z {"level":"info","ts":"2026-03-18T17:48:44.409773Z","caller":"traceutil/trace.go:171","msg":"trace[2009469308] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-cluster-node-tuning-operator/trusted-ca; range_end:; response_count:1; response_revision:10311; }","duration":"971.526135ms","start":"2026-03-18T17:48:43.438234Z","end":"2026-03-18T17:48:44.409760Z","steps":["trace[2009469308] 'agreement among raft nodes before linearized reading' (duration: 969.957171ms)"],"step_count":1} 2026-03-18T17:48:44.409915637Z {"level":"info","ts":"2026-03-18T17:48:44.409808Z","caller":"traceutil/trace.go:171","msg":"trace[573324489] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-cluster; range_end:; response_count:1; response_revision:10311; }","duration":"170.713798ms","start":"2026-03-18T17:48:44.239089Z","end":"2026-03-18T17:48:44.409803Z","steps":["trace[573324489] 'agreement among raft nodes before linearized reading' (duration: 170.668757ms)"],"step_count":1} 2026-03-18T17:48:44.409915637Z {"level":"warn","ts":"2026-03-18T17:48:44.409810Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:43.438225Z","time spent":"971.577517ms","remote":"[::1]:40216","response type":"/etcdserverpb.KV/Range","request count":0,"request size":77,"response count":1,"response size":225327,"request content":"key:\"/kubernetes.io/configmaps/openshift-cluster-node-tuning-operator/trusted-ca\" "} 2026-03-18T17:48:44.409948738Z {"level":"warn","ts":"2026-03-18T17:48:44.409916Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"521.571017ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-cluster-storage-operator/csi-snapshot-controller-operator\" ","response":"range_response_count:1 size:1710"} 2026-03-18T17:48:44.410008920Z {"level":"info","ts":"2026-03-18T17:48:44.409955Z","caller":"traceutil/trace.go:171","msg":"trace[1942630227] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-cluster-storage-operator/csi-snapshot-controller-operator; range_end:; response_count:1; response_revision:10311; }","duration":"521.624449ms","start":"2026-03-18T17:48:43.888317Z","end":"2026-03-18T17:48:44.409941Z","steps":["trace[1942630227] 'agreement among raft nodes before linearized reading' (duration: 521.557077ms)"],"step_count":1} 2026-03-18T17:48:44.410030860Z {"level":"warn","ts":"2026-03-18T17:48:44.409999Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:43.888310Z","time spent":"521.67905ms","remote":"[::1]:34924","response type":"/etcdserverpb.KV/Range","request count":0,"request size":100,"response count":1,"response size":1734,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-cluster-storage-operator/csi-snapshot-controller-operator\" "} 2026-03-18T17:48:44.410117403Z {"level":"warn","ts":"2026-03-18T17:48:44.410035Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"546.905837ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-ovirt-infra\" ","response":"range_response_count:1 size:1855"} 2026-03-18T17:48:44.410117403Z {"level":"info","ts":"2026-03-18T17:48:44.410069Z","caller":"traceutil/trace.go:171","msg":"trace[1266494354] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-ovirt-infra; range_end:; response_count:1; response_revision:10311; }","duration":"546.984819ms","start":"2026-03-18T17:48:43.863077Z","end":"2026-03-18T17:48:44.410061Z","steps":["trace[1266494354] 'agreement among raft nodes before linearized reading' (duration: 546.919047ms)"],"step_count":1} 2026-03-18T17:48:44.410117403Z {"level":"warn","ts":"2026-03-18T17:48:44.410093Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:43.863056Z","time spent":"547.032071ms","remote":"[::1]:33650","response type":"/etcdserverpb.KV/Range","request count":0,"request size":49,"response count":1,"response size":1879,"request content":"key:\"/kubernetes.io/namespaces/openshift-ovirt-infra\" "} 2026-03-18T17:48:44.410219375Z {"level":"warn","ts":"2026-03-18T17:48:44.410167Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"525.910718ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook\" ","response":"range_response_count:1 size:5206"} 2026-03-18T17:48:44.410237476Z {"level":"info","ts":"2026-03-18T17:48:44.410211Z","caller":"traceutil/trace.go:171","msg":"trace[1827212306] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook; range_end:; response_count:1; response_revision:10311; }","duration":"525.97676ms","start":"2026-03-18T17:48:43.884224Z","end":"2026-03-18T17:48:44.410200Z","steps":["trace[1827212306] 'agreement among raft nodes before linearized reading' (duration: 525.893958ms)"],"step_count":1} 2026-03-18T17:48:44.410326229Z {"level":"warn","ts":"2026-03-18T17:48:44.410243Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:43.884210Z","time spent":"526.025961ms","remote":"[::1]:40312","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":5230,"request content":"key:\"/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook\" "} 2026-03-18T17:48:44.998647829Z {"level":"info","ts":"2026-03-18T17:48:44.998532Z","caller":"traceutil/trace.go:171","msg":"trace[589425867] linearizableReadLoop","detail":"{readStateIndex:10793; appliedIndex:10792; }","duration":"570.837058ms","start":"2026-03-18T17:48:44.427672Z","end":"2026-03-18T17:48:44.998509Z","steps":["trace[589425867] 'read index received' (duration: 383.818644ms)","trace[589425867] 'applied index is now lower than readState.Index' (duration: 187.017124ms)"],"step_count":2} 2026-03-18T17:48:44.998893816Z {"level":"info","ts":"2026-03-18T17:48:44.998607Z","caller":"traceutil/trace.go:171","msg":"trace[2069583575] transaction","detail":"{read_only:false; response_revision:10312; number_of_response:1; }","duration":"573.590676ms","start":"2026-03-18T17:48:44.424954Z","end":"2026-03-18T17:48:44.998545Z","steps":["trace[2069583575] 'process raft request' (duration: 386.539881ms)","trace[2069583575] 'compare' (duration: 186.86129ms)"],"step_count":2} 2026-03-18T17:48:44.999089221Z {"level":"warn","ts":"2026-03-18T17:48:44.998991Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.424926Z","time spent":"573.966387ms","remote":"[::1]:40216","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":5221,"response count":0,"response size":40,"request content":"compare: success:> failure:<>"} 2026-03-18T17:48:44.999443731Z {"level":"warn","ts":"2026-03-18T17:48:44.999331Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"571.637032ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/events/openshift-kube-scheduler-operator/\" range_end:\"/kubernetes.io/events/openshift-kube-scheduler-operator0\" ","response":"range_response_count:83 size:91854"} 2026-03-18T17:48:44.999443731Z {"level":"info","ts":"2026-03-18T17:48:44.999393Z","caller":"traceutil/trace.go:171","msg":"trace[662701126] range","detail":"{range_begin:/kubernetes.io/events/openshift-kube-scheduler-operator/; range_end:/kubernetes.io/events/openshift-kube-scheduler-operator0; response_count:83; response_revision:10312; }","duration":"571.749785ms","start":"2026-03-18T17:48:44.427626Z","end":"2026-03-18T17:48:44.999376Z","steps":["trace[662701126] 'agreement among raft nodes before linearized reading' (duration: 571.056356ms)"],"step_count":1} 2026-03-18T17:48:44.999523763Z {"level":"warn","ts":"2026-03-18T17:48:44.999439Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.427602Z","time spent":"571.824297ms","remote":"[::1]:39244","response type":"/etcdserverpb.KV/Range","request count":0,"request size":116,"response count":83,"response size":91878,"request content":"key:\"/kubernetes.io/events/openshift-kube-scheduler-operator/\" range_end:\"/kubernetes.io/events/openshift-kube-scheduler-operator0\" "} 2026-03-18T17:48:45.071820141Z {"level":"warn","ts":"2026-03-18T17:48:45.071656Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"333.445462ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operator.openshift.io/cloudcredentials/cluster\" ","response":"range_response_count:1 size:621"} 2026-03-18T17:48:45.071820141Z {"level":"warn","ts":"2026-03-18T17:48:45.071682Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"557.98311ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-config-managed/machine-approver\" ","response":"range_response_count:1 size:1187"} 2026-03-18T17:48:45.071820141Z {"level":"info","ts":"2026-03-18T17:48:45.071756Z","caller":"traceutil/trace.go:171","msg":"trace[1753527466] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/cloudcredentials/cluster; range_end:; response_count:1; response_revision:10314; }","duration":"333.599716ms","start":"2026-03-18T17:48:44.738138Z","end":"2026-03-18T17:48:45.071738Z","steps":["trace[1753527466] 'agreement among raft nodes before linearized reading' (duration: 333.368539ms)"],"step_count":1} 2026-03-18T17:48:45.071820141Z {"level":"warn","ts":"2026-03-18T17:48:45.071783Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"359.312998ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-machine-config-operator/machine-config-controller\" ","response":"range_response_count:1 size:3025"} 2026-03-18T17:48:45.071900933Z {"level":"warn","ts":"2026-03-18T17:48:45.071805Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.738113Z","time spent":"333.684058ms","remote":"[::1]:46058","response type":"/etcdserverpb.KV/Range","request count":0,"request size":63,"response count":1,"response size":645,"request content":"key:\"/kubernetes.io/operator.openshift.io/cloudcredentials/cluster\" "} 2026-03-18T17:48:45.071900933Z {"level":"warn","ts":"2026-03-18T17:48:45.071776Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"583.260098ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/cluster-network-operator\" ","response":"range_response_count:1 size:1073"} 2026-03-18T17:48:45.071900933Z {"level":"info","ts":"2026-03-18T17:48:45.071833Z","caller":"traceutil/trace.go:171","msg":"trace[1152348207] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-machine-config-operator/machine-config-controller; range_end:; response_count:1; response_revision:10314; }","duration":"359.37442ms","start":"2026-03-18T17:48:44.712437Z","end":"2026-03-18T17:48:45.071812Z","steps":["trace[1152348207] 'agreement among raft nodes before linearized reading' (duration: 359.310908ms)"],"step_count":1} 2026-03-18T17:48:45.071900933Z {"level":"warn","ts":"2026-03-18T17:48:45.071849Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"459.23636ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/cluster-samples-operator-proxy-reader\" ","response":"range_response_count:1 size:1100"} 2026-03-18T17:48:45.071900933Z {"level":"warn","ts":"2026-03-18T17:48:45.071867Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.712421Z","time spent":"359.439121ms","remote":"[::1]:39388","response type":"/etcdserverpb.KV/Range","request count":0,"request size":114,"response count":1,"response size":3049,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-machine-config-operator/machine-config-controller\" "} 2026-03-18T17:48:45.071900933Z {"level":"info","ts":"2026-03-18T17:48:45.071881Z","caller":"traceutil/trace.go:171","msg":"trace[646183269] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/cluster-samples-operator-proxy-reader; range_end:; response_count:1; response_revision:10314; }","duration":"459.291311ms","start":"2026-03-18T17:48:44.612580Z","end":"2026-03-18T17:48:45.071871Z","steps":["trace[646183269] 'agreement among raft nodes before linearized reading' (duration: 459.22493ms)"],"step_count":1} 2026-03-18T17:48:45.071944364Z {"level":"warn","ts":"2026-03-18T17:48:45.071917Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"608.593218ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/cluster-autoscaler-operator\" ","response":"range_response_count:1 size:1187"} 2026-03-18T17:48:45.071960695Z {"level":"warn","ts":"2026-03-18T17:48:45.071924Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.612537Z","time spent":"459.379984ms","remote":"[::1]:39182","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":1124,"request content":"key:\"/kubernetes.io/clusterrolebindings/cluster-samples-operator-proxy-reader\" "} 2026-03-18T17:48:45.071976445Z {"level":"info","ts":"2026-03-18T17:48:45.071946Z","caller":"traceutil/trace.go:171","msg":"trace[1723814228] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/cluster-autoscaler-operator; range_end:; response_count:1; response_revision:10314; }","duration":"608.64591ms","start":"2026-03-18T17:48:44.463292Z","end":"2026-03-18T17:48:45.071938Z","steps":["trace[1723814228] 'agreement among raft nodes before linearized reading' (duration: 608.594699ms)"],"step_count":1} 2026-03-18T17:48:45.072036157Z {"level":"warn","ts":"2026-03-18T17:48:45.071983Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.463251Z","time spent":"608.720932ms","remote":"[::1]:39182","response type":"/etcdserverpb.KV/Range","request count":0,"request size":64,"response count":1,"response size":1211,"request content":"key:\"/kubernetes.io/clusterrolebindings/cluster-autoscaler-operator\" "} 2026-03-18T17:48:45.072124569Z {"level":"info","ts":"2026-03-18T17:48:45.072073Z","caller":"traceutil/trace.go:171","msg":"trace[531912944] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook; range_end:; response_count:1; response_revision:10314; }","duration":"187.089327ms","start":"2026-03-18T17:48:44.884967Z","end":"2026-03-18T17:48:45.072056Z","steps":["trace[531912944] 'agreement among raft nodes before linearized reading' (duration: 187.050176ms)"],"step_count":1} 2026-03-18T17:48:45.072145620Z {"level":"warn","ts":"2026-03-18T17:48:45.072106Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"384.065372ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-etcd-operator/etcd-service-ca-bundle\" ","response":"range_response_count:1 size:2605"} 2026-03-18T17:48:45.072145620Z {"level":"warn","ts":"2026-03-18T17:48:45.072124Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"635.594605ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T17:48:45.072177341Z {"level":"info","ts":"2026-03-18T17:48:45.072142Z","caller":"traceutil/trace.go:171","msg":"trace[1303532218] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-etcd-operator/etcd-service-ca-bundle; range_end:; response_count:1; response_revision:10314; }","duration":"384.137383ms","start":"2026-03-18T17:48:44.687992Z","end":"2026-03-18T17:48:45.072129Z","steps":["trace[1303532218] 'agreement among raft nodes before linearized reading' (duration: 384.074022ms)"],"step_count":1} 2026-03-18T17:48:45.072177341Z {"level":"info","ts":"2026-03-18T17:48:45.072154Z","caller":"traceutil/trace.go:171","msg":"trace[1481713155] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10314; }","duration":"635.624336ms","start":"2026-03-18T17:48:44.436521Z","end":"2026-03-18T17:48:45.072146Z","steps":["trace[1481713155] 'agreement among raft nodes before linearized reading' (duration: 635.577395ms)"],"step_count":1} 2026-03-18T17:48:45.072203312Z {"level":"warn","ts":"2026-03-18T17:48:45.072176Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.687969Z","time spent":"384.198125ms","remote":"[::1]:40216","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":2629,"request content":"key:\"/kubernetes.io/configmaps/openshift-etcd-operator/etcd-service-ca-bundle\" "} 2026-03-18T17:48:45.072203312Z {"level":"warn","ts":"2026-03-18T17:48:45.072184Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.436489Z","time spent":"635.688748ms","remote":"[::1]:39318","response type":"/etcdserverpb.KV/Range","request count":0,"request size":50,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 "} 2026-03-18T17:48:45.072349466Z {"level":"warn","ts":"2026-03-18T17:48:45.072247Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"483.266874ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-console/prometheus-k8s\" ","response":"range_response_count:0 size:5"} 2026-03-18T17:48:45.072349466Z {"level":"warn","ts":"2026-03-18T17:48:45.072310Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"209.597038ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-ingress-operator\" ","response":"range_response_count:1 size:1941"} 2026-03-18T17:48:45.072349466Z {"level":"info","ts":"2026-03-18T17:48:45.072325Z","caller":"traceutil/trace.go:171","msg":"trace[1576588244] range","detail":"{range_begin:/kubernetes.io/roles/openshift-console/prometheus-k8s; range_end:; response_count:0; response_revision:10314; }","duration":"483.388948ms","start":"2026-03-18T17:48:44.588926Z","end":"2026-03-18T17:48:45.072315Z","steps":["trace[1576588244] 'agreement among raft nodes before linearized reading' (duration: 483.285335ms)"],"step_count":1} 2026-03-18T17:48:45.072387197Z {"level":"info","ts":"2026-03-18T17:48:45.072341Z","caller":"traceutil/trace.go:171","msg":"trace[1854206380] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-ingress-operator; range_end:; response_count:1; response_revision:10314; }","duration":"209.64722ms","start":"2026-03-18T17:48:44.862686Z","end":"2026-03-18T17:48:45.072333Z","steps":["trace[1854206380] 'agreement among raft nodes before linearized reading' (duration: 209.557508ms)"],"step_count":1} 2026-03-18T17:48:45.072387197Z {"level":"warn","ts":"2026-03-18T17:48:45.072360Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.588891Z","time spent":"483.46167ms","remote":"[::1]:46016","response type":"/etcdserverpb.KV/Range","request count":0,"request size":55,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/roles/openshift-console/prometheus-k8s\" "} 2026-03-18T17:48:45.072549531Z {"level":"warn","ts":"2026-03-18T17:48:45.072421Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"408.956319ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/openshift-csi-snapshot-controller-runner\" ","response":"range_response_count:1 size:2080"} 2026-03-18T17:48:45.072549531Z {"level":"warn","ts":"2026-03-18T17:48:45.072468Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"644.625709ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T17:48:45.072549531Z {"level":"info","ts":"2026-03-18T17:48:45.071859Z","caller":"traceutil/trace.go:171","msg":"trace[1159565806] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/cluster-network-operator; range_end:; response_count:1; response_revision:10314; }","duration":"583.386712ms","start":"2026-03-18T17:48:44.488453Z","end":"2026-03-18T17:48:45.071840Z","steps":["trace[1159565806] 'agreement among raft nodes before linearized reading' (duration: 583.258779ms)"],"step_count":1} 2026-03-18T17:48:45.072549531Z {"level":"info","ts":"2026-03-18T17:48:45.072500Z","caller":"traceutil/trace.go:171","msg":"trace[1914916329] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10314; }","duration":"644.680041ms","start":"2026-03-18T17:48:44.427811Z","end":"2026-03-18T17:48:45.072491Z","steps":["trace[1914916329] 'agreement among raft nodes before linearized reading' (duration: 644.635859ms)"],"step_count":1} 2026-03-18T17:48:45.072549531Z {"level":"warn","ts":"2026-03-18T17:48:45.072518Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.488423Z","time spent":"584.085471ms","remote":"[::1]:39182","response type":"/etcdserverpb.KV/Range","request count":0,"request size":61,"response count":1,"response size":1097,"request content":"key:\"/kubernetes.io/clusterrolebindings/cluster-network-operator\" "} 2026-03-18T17:48:45.072576572Z {"level":"warn","ts":"2026-03-18T17:48:45.072530Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.427804Z","time spent":"644.719441ms","remote":"[::1]:39216","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 "} 2026-03-18T17:48:45.072592262Z {"level":"warn","ts":"2026-03-18T17:48:45.072562Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"509.696364ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-console-operator/prometheus-k8s\" ","response":"range_response_count:0 size:5"} 2026-03-18T17:48:45.072643854Z {"level":"info","ts":"2026-03-18T17:48:45.072595Z","caller":"traceutil/trace.go:171","msg":"trace[399479250] range","detail":"{range_begin:/kubernetes.io/roles/openshift-console-operator/prometheus-k8s; range_end:; response_count:0; response_revision:10314; }","duration":"509.739776ms","start":"2026-03-18T17:48:44.562845Z","end":"2026-03-18T17:48:45.072585Z","steps":["trace[399479250] 'agreement among raft nodes before linearized reading' (duration: 509.687455ms)"],"step_count":1} 2026-03-18T17:48:45.072660954Z {"level":"warn","ts":"2026-03-18T17:48:45.072636Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.562838Z","time spent":"509.792127ms","remote":"[::1]:46016","response type":"/etcdserverpb.KV/Range","request count":0,"request size":64,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/roles/openshift-console-operator/prometheus-k8s\" "} 2026-03-18T17:48:45.072738486Z {"level":"warn","ts":"2026-03-18T17:48:45.072691Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"217.933482ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/\" range_end:\"/kubernetes.io/clusterroles0\" count_only:true ","response":"range_response_count:0 size:8"} 2026-03-18T17:48:45.072755797Z {"level":"info","ts":"2026-03-18T17:48:45.072727Z","caller":"traceutil/trace.go:171","msg":"trace[143022415] range","detail":"{range_begin:/kubernetes.io/clusterroles/; range_end:/kubernetes.io/clusterroles0; response_count:0; response_revision:10314; }","duration":"218.008624ms","start":"2026-03-18T17:48:44.854710Z","end":"2026-03-18T17:48:45.072719Z","steps":["trace[143022415] 'agreement among raft nodes before linearized reading' (duration: 217.786838ms)"],"step_count":1} 2026-03-18T17:48:45.072830519Z {"level":"warn","ts":"2026-03-18T17:48:45.072423Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"644.029552ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T17:48:45.072851219Z {"level":"warn","ts":"2026-03-18T17:48:45.072826Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"535.55564ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-gcp-pd-csi-driver-operator\" ","response":"range_response_count:1 size:2552"} 2026-03-18T17:48:45.072872670Z {"level":"info","ts":"2026-03-18T17:48:45.072843Z","caller":"traceutil/trace.go:171","msg":"trace[1685697602] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10314; }","duration":"644.442044ms","start":"2026-03-18T17:48:44.428374Z","end":"2026-03-18T17:48:45.072816Z","steps":["trace[1685697602] 'agreement among raft nodes before linearized reading' (duration: 644.017452ms)"],"step_count":1} 2026-03-18T17:48:45.072888771Z {"level":"info","ts":"2026-03-18T17:48:45.072864Z","caller":"traceutil/trace.go:171","msg":"trace[1850106976] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-gcp-pd-csi-driver-operator; range_end:; response_count:1; response_revision:10314; }","duration":"535.626281ms","start":"2026-03-18T17:48:44.537221Z","end":"2026-03-18T17:48:45.072847Z","steps":["trace[1850106976] 'agreement among raft nodes before linearized reading' (duration: 535.547929ms)"],"step_count":1} 2026-03-18T17:48:45.072908261Z {"level":"warn","ts":"2026-03-18T17:48:45.072885Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.428368Z","time spent":"644.505655ms","remote":"[::1]:34924","response type":"/etcdserverpb.KV/Range","request count":0,"request size":34,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/serviceaccounts\" limit:1 "} 2026-03-18T17:48:45.072924231Z {"level":"warn","ts":"2026-03-18T17:48:45.072897Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.537198Z","time spent":"535.690814ms","remote":"[::1]:39214","response type":"/etcdserverpb.KV/Range","request count":0,"request size":139,"response count":1,"response size":2576,"request content":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-gcp-pd-csi-driver-operator\" "} 2026-03-18T17:48:45.072924231Z {"level":"warn","ts":"2026-03-18T17:48:45.072904Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"234.034484ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-controller-manager-operator/openshift-controller-manager-operator\" ","response":"range_response_count:1 size:1670"} 2026-03-18T17:48:45.072948022Z {"level":"info","ts":"2026-03-18T17:48:45.071776Z","caller":"traceutil/trace.go:171","msg":"trace[1946038720] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-config-managed/machine-approver; range_end:; response_count:1; response_revision:10314; }","duration":"558.125654ms","start":"2026-03-18T17:48:44.513627Z","end":"2026-03-18T17:48:45.071753Z","steps":["trace[1946038720] 'agreement among raft nodes before linearized reading' (duration: 557.904668ms)"],"step_count":1} 2026-03-18T17:48:45.072948022Z {"level":"info","ts":"2026-03-18T17:48:45.072932Z","caller":"traceutil/trace.go:171","msg":"trace[498143468] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-controller-manager-operator/openshift-controller-manager-operator; range_end:; response_count:1; response_revision:10314; }","duration":"234.103355ms","start":"2026-03-18T17:48:44.838819Z","end":"2026-03-18T17:48:45.072922Z","steps":["trace[498143468] 'agreement among raft nodes before linearized reading' (duration: 234.036844ms)"],"step_count":1} 2026-03-18T17:48:45.073002474Z {"level":"warn","ts":"2026-03-18T17:48:45.072953Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.513599Z","time spent":"559.342177ms","remote":"[::1]:39116","response type":"/etcdserverpb.KV/Range","request count":0,"request size":71,"response count":1,"response size":1211,"request content":"key:\"/kubernetes.io/rolebindings/openshift-config-managed/machine-approver\" "} 2026-03-18T17:48:45.073067575Z {"level":"warn","ts":"2026-03-18T17:48:45.073025Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"259.94241ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/ingresses/cluster\" ","response":"range_response_count:1 size:886"} 2026-03-18T17:48:45.073067575Z {"level":"info","ts":"2026-03-18T17:48:45.073054Z","caller":"traceutil/trace.go:171","msg":"trace[1458174506] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/ingresses/cluster; range_end:; response_count:1; response_revision:10314; }","duration":"260.003022ms","start":"2026-03-18T17:48:44.813044Z","end":"2026-03-18T17:48:45.073047Z","steps":["trace[1458174506] 'agreement among raft nodes before linearized reading' (duration: 259.9474ms)"],"step_count":1} 2026-03-18T17:48:45.073237980Z {"level":"info","ts":"2026-03-18T17:48:45.072468Z","caller":"traceutil/trace.go:171","msg":"trace[532908622] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-csi-snapshot-controller-runner; range_end:; response_count:1; response_revision:10314; }","duration":"409.027682ms","start":"2026-03-18T17:48:44.663431Z","end":"2026-03-18T17:48:45.072459Z","steps":["trace[532908622] 'agreement among raft nodes before linearized reading' (duration: 408.946449ms)"],"step_count":1} 2026-03-18T17:48:45.073270771Z {"level":"warn","ts":"2026-03-18T17:48:45.073231Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.663412Z","time spent":"409.810143ms","remote":"[::1]:34704","response type":"/etcdserverpb.KV/Range","request count":0,"request size":70,"response count":1,"response size":2104,"request content":"key:\"/kubernetes.io/clusterroles/openshift-csi-snapshot-controller-runner\" "} 2026-03-18T17:48:45.073341383Z {"level":"warn","ts":"2026-03-18T17:48:45.073317Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"285.95885ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operator.openshift.io/servicecas/cluster\" ","response":"range_response_count:1 size:3579"} 2026-03-18T17:48:45.073364804Z {"level":"info","ts":"2026-03-18T17:48:45.073341Z","caller":"traceutil/trace.go:171","msg":"trace[709314424] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/servicecas/cluster; range_end:; response_count:1; response_revision:10314; }","duration":"286.005341ms","start":"2026-03-18T17:48:44.787329Z","end":"2026-03-18T17:48:45.073335Z","steps":["trace[709314424] 'agreement among raft nodes before linearized reading' (duration: 285.925809ms)"],"step_count":1} 2026-03-18T17:48:45.073586140Z {"level":"warn","ts":"2026-03-18T17:48:45.073240Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"260.564348ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/security.openshift.io/securitycontextconstraints/\" range_end:\"/kubernetes.io/security.openshift.io/securitycontextconstraints0\" count_only:true ","response":"range_response_count:0 size:7"} 2026-03-18T17:48:45.073586140Z {"level":"warn","ts":"2026-03-18T17:48:45.073512Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"309.903751ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator\" ","response":"range_response_count:1 size:1634"} 2026-03-18T17:48:45.073586140Z {"level":"info","ts":"2026-03-18T17:48:45.073537Z","caller":"traceutil/trace.go:171","msg":"trace[1714797256] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator; range_end:; response_count:1; response_revision:10314; }","duration":"309.956302ms","start":"2026-03-18T17:48:44.763572Z","end":"2026-03-18T17:48:45.073528Z","steps":["trace[1714797256] 'agreement among raft nodes before linearized reading' (duration: 309.901101ms)"],"step_count":1} 2026-03-18T17:48:45.073586140Z {"level":"info","ts":"2026-03-18T17:48:45.073534Z","caller":"traceutil/trace.go:171","msg":"trace[1795073955] range","detail":"{range_begin:/kubernetes.io/security.openshift.io/securitycontextconstraints/; range_end:/kubernetes.io/security.openshift.io/securitycontextconstraints0; response_count:0; response_revision:10314; }","duration":"260.889677ms","start":"2026-03-18T17:48:44.812630Z","end":"2026-03-18T17:48:45.073520Z","steps":["trace[1795073955] 'agreement among raft nodes before linearized reading' (duration: 260.561858ms)"],"step_count":1} 2026-03-18T17:48:45.073586140Z {"level":"warn","ts":"2026-03-18T17:48:45.073559Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.763556Z","time spent":"309.997704ms","remote":"[::1]:34924","response type":"/etcdserverpb.KV/Range","request count":0,"request size":100,"response count":1,"response size":1658,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator\" "} 2026-03-18T17:48:45.073684063Z {"level":"warn","ts":"2026-03-18T17:48:45.071704Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"433.445646ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/insights-operator-gather\" ","response":"range_response_count:1 size:2487"} 2026-03-18T17:48:45.073702553Z {"level":"info","ts":"2026-03-18T17:48:45.073672Z","caller":"traceutil/trace.go:171","msg":"trace[1783538002] range","detail":"{range_begin:/kubernetes.io/clusterroles/insights-operator-gather; range_end:; response_count:1; response_revision:10314; }","duration":"435.447822ms","start":"2026-03-18T17:48:44.638214Z","end":"2026-03-18T17:48:45.073662Z","steps":["trace[1783538002] 'agreement among raft nodes before linearized reading' (duration: 433.399045ms)"],"step_count":1} 2026-03-18T17:48:45.073718923Z {"level":"warn","ts":"2026-03-18T17:48:45.073700Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.638198Z","time spent":"435.494793ms","remote":"[::1]:34704","response type":"/etcdserverpb.KV/Range","request count":0,"request size":54,"response count":1,"response size":2511,"request content":"key:\"/kubernetes.io/clusterroles/insights-operator-gather\" "} 2026-03-18T17:48:45.073872048Z {"level":"warn","ts":"2026-03-18T17:48:45.072084Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"632.948381ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-kube-scheduler/prometheus-k8s\" ","response":"range_response_count:1 size:864"} 2026-03-18T17:48:45.073892918Z {"level":"info","ts":"2026-03-18T17:48:45.073861Z","caller":"traceutil/trace.go:171","msg":"trace[537984639] range","detail":"{range_begin:/kubernetes.io/roles/openshift-kube-scheduler/prometheus-k8s; range_end:; response_count:1; response_revision:10314; }","duration":"634.759631ms","start":"2026-03-18T17:48:44.439090Z","end":"2026-03-18T17:48:45.073850Z","steps":["trace[537984639] 'agreement among raft nodes before linearized reading' (duration: 632.960511ms)"],"step_count":1} 2026-03-18T17:48:45.073912879Z {"level":"warn","ts":"2026-03-18T17:48:45.073894Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.439062Z","time spent":"634.823193ms","remote":"[::1]:46016","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":1,"response size":888,"request content":"key:\"/kubernetes.io/roles/openshift-kube-scheduler/prometheus-k8s\" "} 2026-03-18T17:48:45.074105684Z {"level":"info","ts":"2026-03-18T17:48:45.074044Z","caller":"traceutil/trace.go:171","msg":"trace[1050959010] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-apiserver-operator/metrics; range_end:; response_count:1; response_revision:10314; }","duration":"135.010776ms","start":"2026-03-18T17:48:44.939022Z","end":"2026-03-18T17:48:45.074032Z","steps":["trace[1050959010] 'agreement among raft nodes before linearized reading' (duration: 134.973955ms)"],"step_count":1} 2026-03-18T17:48:45.074189666Z {"level":"info","ts":"2026-03-18T17:48:45.074137Z","caller":"traceutil/trace.go:171","msg":"trace[483845459] transaction","detail":"{read_only:false; response_revision:10313; number_of_response:1; }","duration":"642.875829ms","start":"2026-03-18T17:48:44.431247Z","end":"2026-03-18T17:48:45.074122Z","steps":["trace[483845459] 'process raft request' (duration: 639.838244ms)"],"step_count":1} 2026-03-18T17:48:45.074341322Z {"level":"info","ts":"2026-03-18T17:48:45.074255Z","caller":"traceutil/trace.go:171","msg":"trace[1750017146] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-authentication-operator/authentication-operator; range_end:; response_count:1; response_revision:10314; }","duration":"111.808596ms","start":"2026-03-18T17:48:44.962436Z","end":"2026-03-18T17:48:45.074245Z","steps":["trace[1750017146] 'agreement among raft nodes before linearized reading' (duration: 111.774824ms)"],"step_count":1} 2026-03-18T17:48:45.074341322Z {"level":"warn","ts":"2026-03-18T17:48:45.074260Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.431229Z","time spent":"642.952671ms","remote":"[::1]:45924","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":5571,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-03-18T17:48:45.074694111Z {"level":"info","ts":"2026-03-18T17:48:45.074635Z","caller":"traceutil/trace.go:171","msg":"trace[333191701] transaction","detail":"{read_only:false; response_revision:10314; number_of_response:1; }","duration":"627.618841ms","start":"2026-03-18T17:48:44.447000Z","end":"2026-03-18T17:48:45.074619Z","steps":["trace[333191701] 'process raft request' (duration: 624.238726ms)"],"step_count":1} 2026-03-18T17:48:45.074756783Z {"level":"warn","ts":"2026-03-18T17:48:45.074708Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T17:48:44.446970Z","time spent":"627.705054ms","remote":"[::1]:39244","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":987,"response count":0,"response size":40,"request content":"compare: success:> failure:<>"} 2026-03-18T17:48:45.075016220Z {"level":"info","ts":"2026-03-18T17:48:45.074843Z","caller":"traceutil/trace.go:171","msg":"trace[1385055445] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-network-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10314; }","duration":"161.464409ms","start":"2026-03-18T17:48:44.913342Z","end":"2026-03-18T17:48:45.074807Z","steps":["trace[1385055445] 'agreement among raft nodes before linearized reading' (duration: 161.364436ms)"],"step_count":1} 2026-03-18T17:48:45.075016220Z {"level":"info","ts":"2026-03-18T17:48:45.074948Z","caller":"traceutil/trace.go:171","msg":"trace[1897788845] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-operators; range_end:; response_count:1; response_revision:10314; }","duration":"187.513129ms","start":"2026-03-18T17:48:44.887417Z","end":"2026-03-18T17:48:45.074930Z","steps":["trace[1897788845] 'agreement among raft nodes before linearized reading' (duration: 187.437787ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715156562607023137 0ustar00000000000000002026-03-18T17:43:12.873611449Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-688fbbb854-6n26v/oauth-apiserver_current.log0000640000000000000000000011402415156562607031227 0ustar00000000000000002026-03-18T17:46:34.909055155Z E0318 17:46:34.909000 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:35.903353970Z E0318 17:46:35.903208 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:35.903681549Z E0318 17:46:35.903625 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:35.903707749Z E0318 17:46:35.903684 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:35.903924705Z E0318 17:46:35.903752 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:35.904171302Z E0318 17:46:35.904129 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.400493577Z E0318 17:46:55.400036 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.404341962Z E0318 17:46:55.400815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.404341962Z E0318 17:46:55.401155 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.404341962Z E0318 17:46:55.401211 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.404341962Z E0318 17:46:55.401522 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.404341962Z E0318 17:46:55.401807 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.404341962Z E0318 17:46:55.401883 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.404341962Z E0318 17:46:55.402155 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.404341962Z E0318 17:46:55.402544 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.404341962Z E0318 17:46:55.402727 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.492597007Z E0318 17:46:55.492534 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.502491487Z E0318 17:46:55.502414 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.520620163Z E0318 17:46:55.520579 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:46:55.530314778Z E0318 17:46:55.530267 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:04.919938901Z E0318 17:47:04.919872 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:04.920265940Z E0318 17:47:04.920169 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:04.920549528Z E0318 17:47:04.919904 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:04.920580049Z E0318 17:47:04.920559 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:04.920945909Z E0318 17:47:04.920897 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:05.915166522Z E0318 17:47:05.915050 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:05.916102078Z E0318 17:47:05.915937 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:05.916757056Z E0318 17:47:05.916659 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:05.917200318Z E0318 17:47:05.917139 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:05.917753843Z E0318 17:47:05.917667 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.405213458Z E0318 17:47:25.405104 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.405213458Z E0318 17:47:25.405117 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.405213458Z E0318 17:47:25.405143 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.405340732Z E0318 17:47:25.405244 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.405340732Z E0318 17:47:25.405319 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.440357366Z E0318 17:47:25.440254 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.441063893Z E0318 17:47:25.441032 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.441395786Z E0318 17:47:25.441373 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.441711078Z E0318 17:47:25.441688 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:25.442065982Z E0318 17:47:25.442043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:34.928969100Z E0318 17:47:34.928834 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:34.928969100Z E0318 17:47:34.928886 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:34.928969100Z E0318 17:47:34.928951 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:34.929176828Z E0318 17:47:34.928834 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:34.929331594Z E0318 17:47:34.928834 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:35.927938142Z E0318 17:47:35.927812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:35.927938142Z E0318 17:47:35.927890 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:35.927938142Z E0318 17:47:35.927890 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:35.930004911Z E0318 17:47:35.929903 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:35.930004911Z E0318 17:47:35.929934 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.418750140Z E0318 17:47:55.417296 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.418750140Z E0318 17:47:55.417723 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.418750140Z E0318 17:47:55.417883 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.418750140Z E0318 17:47:55.418044 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.418750140Z E0318 17:47:55.418223 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.419322523Z E0318 17:47:55.419207 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.419322523Z E0318 17:47:55.419252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.419713947Z E0318 17:47:55.419660 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.419830472Z E0318 17:47:55.419786 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.419962997Z E0318 17:47:55.419924 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.463227225Z E0318 17:47:55.462702 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.471128576Z E0318 17:47:55.471058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.478645503Z E0318 17:47:55.478578 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:47:55.486101226Z E0318 17:47:55.486040 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:04.937390751Z E0318 17:48:04.937293 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:04.937390751Z E0318 17:48:04.937344 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:04.937390751Z E0318 17:48:04.937378 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:04.937549657Z E0318 17:48:04.937295 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:04.937686832Z E0318 17:48:04.937295 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:05.939910458Z E0318 17:48:05.939802 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:05.939910458Z E0318 17:48:05.939850 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:05.939984711Z E0318 17:48:05.939935 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:05.940031613Z E0318 17:48:05.939992 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:05.940507681Z E0318 17:48:05.940409 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.418448700Z E0318 17:48:25.418259 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.418644448Z E0318 17:48:25.418564 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.419376505Z E0318 17:48:25.418952 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.419376505Z E0318 17:48:25.419156 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.419376505Z E0318 17:48:25.419362 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.438589958Z E0318 17:48:25.438488 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.439935999Z E0318 17:48:25.439043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.439935999Z E0318 17:48:25.439066 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.439935999Z E0318 17:48:25.439420 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:25.439935999Z E0318 17:48:25.439642 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:34.945322211Z E0318 17:48:34.945217 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:34.945322211Z E0318 17:48:34.945230 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:34.945616800Z E0318 17:48:34.945573 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:34.945675361Z E0318 17:48:34.945637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:34.945804185Z E0318 17:48:34.945765 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:35.951222911Z E0318 17:48:35.951133 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:35.951222911Z E0318 17:48:35.951142 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:35.958133344Z E0318 17:48:35.958066 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:35.958133344Z E0318 17:48:35.958086 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:35.958319819Z E0318 17:48:35.958255 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4662138165324867405, SKID=45:28:42:4F:1F:EF:E2:2B:F3:73:DB:6B:39:09:57:D0:70:60:2C:7B, AKID=DC:EE:A7:28:DC:FD:1B:8A:ED:6E:67:FE:4A:A0:6D:72:E4:4F:15:E5 failed: x509: certificate signed by unknown authority]" 2026-03-18T17:48:36.995459356Z I0318 17:48:36.995331 1 policy_source.go:224] refreshing policies 2026-03-18T17:48:37.998459204Z I0318 17:48:37.998390 1 policy_source.go:224] refreshing policies 2026-03-18T17:48:41.008455806Z I0318 17:48:41.008365 1 policy_source.go:224] refreshing policies 2026-03-18T17:48:42.023087400Z I0318 17:48:42.023017 1 policy_source.go:224] refreshing policies 2026-03-18T17:48:42.035417467Z I0318 17:48:42.035181 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-18T17:48:42.037076303Z I0318 17:48:42.037021 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 config/pod/openshift-ingress/router-default-7dcf5569b5-m5dh4.json0000640000000000000000000001534115156562607023134 0ustar0000000000000000{"metadata":{"name":"router-default-7dcf5569b5-m5dh4","generateName":"router-default-7dcf5569b5-","namespace":"openshift-ingress","uid":"c57f282a-829b-41b2-827a-f4bc598245a2","resourceVersion":"6227","creationTimestamp":"2026-03-18T17:42:13Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"677444c44b","pod-template-hash":"7dcf5569b5"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-7dcf5569b5","uid":"210d02cd-be61-44f1-bf63-6f82534eeeab","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-d6c68","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-d6c68","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["677444c44b"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:13Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003062515156562607037467 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-8sxdf2026-03-18T17:47:40.701701618Z Copying system trust bundle 2026-03-18T17:47:40.833854433Z W0318 17:47:40.833783 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-18T17:47:40.834049260Z I0318 17:47:40.834019 1 observer_polling.go:159] Starting file observer 2026-03-18T17:47:40.834388793Z I0318 17:47:40.834359 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:47:40.834423744Z I0318 17:47:40.834391 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:47:40.834859971Z I0318 17:47:40.834736 1 observer_polling.go:159] Starting file observer 2026-03-18T17:47:40.863869417Z I0318 17:47:40.863809 1 builder.go:304] cluster-authentication-operator version - 2026-03-18T17:47:40.864871055Z I0318 17:47:40.864851 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T17:48:05.166072614Z I0318 17:48:05.164995 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-18T17:48:05.187391436Z I0318 17:48:05.186502 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-18T17:48:05.187391436Z I0318 17:48:05.186529 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-18T17:48:05.187391436Z I0318 17:48:05.186560 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-18T17:48:05.187391436Z I0318 17:48:05.186590 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-18T17:48:05.201676490Z I0318 17:48:05.199177 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T17:48:05.201676490Z W0318 17:48:05.199211 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:05.201676490Z W0318 17:48:05.199216 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T17:48:05.201676490Z W0318 17:48:05.199219 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T17:48:05.201676490Z W0318 17:48:05.199222 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T17:48:05.201676490Z W0318 17:48:05.199225 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T17:48:05.201676490Z W0318 17:48:05.199228 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T17:48:05.201676490Z I0318 17:48:05.199546 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-18T17:48:05.217743142Z I0318 17:48:05.217665 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T17:48:05.218388427Z I0318 17:48:05.218356 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221430 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773855716\" (2026-03-18 17:41:59 +0000 UTC to 2028-03-17 17:42:00 +0000 UTC (now=2026-03-18 17:48:05.221394301 +0000 UTC))" 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221569 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773856061\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773856060\" (2026-03-18 16:47:40 +0000 UTC to 2027-03-18 16:47:40 +0000 UTC (now=2026-03-18 17:48:05.221550608 +0000 UTC))" 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221587 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221608 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221629 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221656 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221683 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221789 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221913 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221918 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221929 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T17:48:05.224668737Z I0318 17:48:05.221933 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:05.224668737Z I0318 17:48:05.222069 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T17:48:05.224668737Z I0318 17:48:05.222075 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T17:48:05.230996648Z I0318 17:48:05.230928 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-18T17:48:05.234800162Z I0318 17:48:05.233314 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-18T17:48:05.235275630Z I0318 17:48:05.235246 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-03-18T17:48:05.323770302Z I0318 17:48:05.323374 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T17:48:05.323770302Z I0318 17:48:05.323451 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T17:48:05.323770302Z I0318 17:48:05.323479 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T17:48:05.323770302Z I0318 17:48:05.323695 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 17:31:45 +0000 UTC to 2026-03-19 17:31:45 +0000 UTC (now=2026-03-18 17:48:05.323659718 +0000 UTC))" 2026-03-18T17:48:05.327368079Z I0318 17:48:05.323876 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773855716\" (2026-03-18 17:41:59 +0000 UTC to 2028-03-17 17:42:00 +0000 UTC (now=2026-03-18 17:48:05.323860186 +0000 UTC))" 2026-03-18T17:48:05.327368079Z I0318 17:48:05.324000 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773856061\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773856060\" (2026-03-18 16:47:40 +0000 UTC to 2027-03-18 16:47:40 +0000 UTC (now=2026-03-18 17:48:05.32398595 +0000 UTC))" 2026-03-18T17:48:05.327368079Z I0318 17:48:05.324307 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 17:25:06 +0000 UTC to 2036-03-15 17:25:06 +0000 UTC (now=2026-03-18 17:48:05.324275411 +0000 UTC))" 2026-03-18T17:48:05.327368079Z I0318 17:48:05.324324 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 17:31:47 +0000 UTC to 2026-03-19 17:31:47 +0000 UTC (now=2026-03-18 17:48:05.324315823 +0000 UTC))" 2026-03-18T17:48:05.327368079Z I0318 17:48:05.324336 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 17:31:47 +0000 UTC to 2027-03-18 17:31:47 +0000 UTC (now=2026-03-18 17:48:05.324328353 +0000 UTC))" 2026-03-18T17:48:05.327368079Z I0318 17:48:05.324348 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 17:31:47 +0000 UTC to 2027-03-18 17:31:47 +0000 UTC (now=2026-03-18 17:48:05.324340944 +0000 UTC))" 2026-03-18T17:48:05.327368079Z I0318 17:48:05.324359 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 17:31:45 +0000 UTC to 2036-03-15 17:31:45 +0000 UTC (now=2026-03-18 17:48:05.324352714 +0000 UTC))" 2026-03-18T17:48:05.327368079Z I0318 17:48:05.324373 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 17:31:45 +0000 UTC to 2026-03-19 17:31:45 +0000 UTC (now=2026-03-18 17:48:05.324366605 +0000 UTC))" 2026-03-18T17:48:05.327368079Z I0318 17:48:05.324467 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773855716\" (2026-03-18 17:41:59 +0000 UTC to 2028-03-17 17:42:00 +0000 UTC (now=2026-03-18 17:48:05.324456588 +0000 UTC))" 2026-03-18T17:48:05.327368079Z I0318 17:48:05.324553 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773856061\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773856060\" (2026-03-18 16:47:40 +0000 UTC to 2027-03-18 16:47:40 +0000 UTC (now=2026-03-18 17:48:05.324541891 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000000336315156562607037660 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-8sxdf2026-03-18T17:45:42.367570722Z Copying system trust bundle 2026-03-18T17:45:42.471232210Z W0318 17:45:42.467666 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-18T17:45:42.471232210Z I0318 17:45:42.468295 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T17:45:42.471232210Z I0318 17:45:42.468322 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T17:45:42.472492560Z I0318 17:45:42.472382 1 observer_polling.go:159] Starting file observer 2026-03-18T17:45:42.472737346Z I0318 17:45:42.472688 1 observer_polling.go:159] Starting file observer 2026-03-18T17:46:42.484819494Z W0318 17:46:42.484727 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-5885bfd7f4-8sxdf) 2026-03-18T17:46:42.484985400Z I0318 17:46:42.484946 1 builder.go:304] cluster-authentication-operator version - 2026-03-18T17:46:42.486187812Z I0318 17:46:42.486127 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T17:47:12.828733232Z F0318 17:47:12.828626 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock": context deadline exceeded config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-8sxdf.json0000640000000000000000000002103515156562607030353 0ustar0000000000000000{"metadata":{"name":"authentication-operator-5885bfd7f4-8sxdf","generateName":"authentication-operator-5885bfd7f4-","namespace":"openshift-authentication-operator","uid":"c087ce06-a16b-41f4-ba93-8fccdee09003","resourceVersion":"9144","creationTimestamp":"2026-03-18T17:40:19Z","labels":{"app":"authentication-operator","pod-template-hash":"5885bfd7f4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.21/23\"],\"mac_address\":\"0a:58:0a:80:00:15\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.21/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.21\"\n ],\n \"mac\": \"0a:58:0a:80:00:15\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-5885bfd7f4","uid":"904ac00b-9b19-4bc0-abbd-e4bd3952d222","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-789k6","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fdcbf7be3f90bd080ffb2c75b091d7eef03681e0f90912ff6140ee48c177616"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.35_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-789k6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c0"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:41Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:41Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.21","podIPs":[{"ip":"10.128.0.21"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-18T17:47:40Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"Copying system trust bundle\nW0318 17:45:42.467666 1 cmd.go:167] Unable to read initial content of \"/tmp/terminate\": open /tmp/terminate: no such file or directory\nI0318 17:45:42.468295 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 17:45:42.468322 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 17:45:42.472382 1 observer_polling.go:159] Starting file observer\nI0318 17:45:42.472688 1 observer_polling.go:159] Starting file observer\nW0318 17:46:42.484727 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-5885bfd7f4-8sxdf)\nI0318 17:46:42.484946 1 builder.go:304] cluster-authentication-operator version -\nI0318 17:46:42.486127 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0318 17:47:12.828626 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-18T17:45:42Z","finishedAt":"2026-03-18T17:47:12Z","containerID":"cri-o://5ef1ad7d9de4700ea957d656ff99f57f457c91f9b150fe99e8b36beb88ed9c42"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","containerID":"cri-o://bc1a4bd14f358c13bdab303413973d3ac603a28259c3850ba80328bdb2347c79","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-789k6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003335015156562607020655 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:36:35Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:36:46Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-7b95f86987 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:36:48Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-5c9796789 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:36:48Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-68f85b4d6c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:36:48Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:36:49Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:36:49Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:40:12Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:40:16Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:40:16Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:40:16Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:40:19Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:40:19Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-68f85b4d6c-qpgfz","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:40:19Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-5c9796789-6hngr","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:40:19Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:40:19Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-7b95f86987-6qqz4","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:40:19Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:41:37Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-6qqz4 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:41:37Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-qpgfz to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:41:37Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-5c9796789-6hngr to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:41:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:41:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:41:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:06Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:06Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:06Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:28Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.14/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:28Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.5/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:28Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.27/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 12.909s (12.909s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:42Z","reason":"LeaderElection","message":"package-server-manager-7b95f86987-6qqz4_5c9066d4-75ca-463c-aeb2-9f57f8f2735e became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 13.279s (13.279s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 13.366s (13.366s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:43Z","reason":"RequirementsUnknown","message":"requirements not yet checked","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:51Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-b8b994c95-kglwt","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:51Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/packageserver-b8b994c95-kglwt to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:51Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-b8b994c95 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:52Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:52Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.59/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:42:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:48:03Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:48:03Z","reason":"InstallCheckFailed","message":"install timeout","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:48:03Z","reason":"NeedsReinstall","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:48:04Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:48:04Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:48:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:48:05Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:48:05Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T17:48:06Z","reason":"LeaderElection","message":"package-server-manager-7b95f86987-6qqz4_1d79e79c-61d8-4123-8ff3-135af64b70d1 became leader","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001155115156562607015454 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-967479477 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:06Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-967479477-gwn76 to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:06Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : secret \"etcd-client\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:06Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-967479477-gwn76","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:10Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:10Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-897b458c6 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:10Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-967479477 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:10Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-967479477-gwn76","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:10Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-897b458c6-vsss9","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:12Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-897b458c6-vsss9 to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:14Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:22Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:28Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" in 6.706s (6.706s including waiting). Image size: 589386806 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:31Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:31Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:31Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:31Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T17:42:31Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"}]}events/openshift-apiserver-operator.json0000640000000000000000000010145615156562607017311 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:36:34Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-d65958b8 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:36:44Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:40:14Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:40:17Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:40:17Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-d65958b8-t266j","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:37Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-t266j to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"LeaderElection","message":"openshift-apiserver-operator-d65958b8-t266j_5b45c2df-cf8f-495d-9136-6fc1677d91c2 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n  }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"All is well\",Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:07Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:36Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:36Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:36Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:36Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:37Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:37Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:37Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"openshift-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:37Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:42:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:47:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:47:24Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T17:47:24Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007174515156562607020222 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:36:32Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-dddff6458 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:36:42Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:40:15Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:40:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:40:18Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-dddff6458-wlfj4","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:37Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-wlfj4 to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.24/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:53Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" in 705ms (705ms including waiting). Image size: 506395599 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-dddff6458-wlfj4_2e82446c-5ec5-47c7-8548-78d31245822c became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:03Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:03Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:08Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:09Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:09Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:11Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:13Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:20Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:21Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:21Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:26Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:29Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:30Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:32Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:42:36Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:47:24Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:47:24Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T17:47:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000516015156562607016355 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.40/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:22Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:23Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:23Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:25Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:34Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.50/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000012307315156562607022027 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:36:33Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-ff989d6cc to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:36:43Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:40:15Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:40:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:40:18Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-ff989d6cc-qk279","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:37Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-qk279 to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.6/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"LeaderElection","message":"kube-controller-manager-operator-ff989d6cc-qk279_8e512bd2-6b41-4f28-a251-be1b8d836f6b became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-cggqt\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n  \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-cggqt\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n  \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n  \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:05Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:08Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:08Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:09Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:12Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:18Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:25Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:27Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:28Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:28Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:29Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:30Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:30Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:30Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:31Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:34Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.6:58874-\u003e172.30.0.10:53: read: connection refused\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.6:58874-\u003e172.30.0.10:53: read: connection refused\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:45Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:46Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:47Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:48Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:53Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:42:53Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:48:02Z","reason":"BackOff","message":"Back-off restarting failed container kube-controller-manager-operator in pod kube-controller-manager-operator-ff989d6cc-qk279_openshift-kube-controller-manager-operator(9b424d6c-7440-4c98-ac19-2d0642c696fd)","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:48:17Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:48:17Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T17:48:17Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000003325015156562607020173 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:42:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.49/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:42:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:42:51Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:44:13Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_37bbec19-22b8-411c-901b-d89c92b0bd4d_0(349c2372b6028362a8094c8894cbb09f3ae556db0e4118357879a2323d7e0d62): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"349c2372b6028362a8094c8894cbb09f3ae556db0e4118357879a2323d7e0d62\" Netns:\"/var/run/netns/2e5c0608-f0fe-4b8d-8948-51dd873276d5\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=349c2372b6028362a8094c8894cbb09f3ae556db0e4118357879a2323d7e0d62;K8S_POD_UID=37bbec19-22b8-411c-901b-d89c92b0bd4d\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/37bbec19-22b8-411c-901b-d89c92b0bd4d]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:45:14Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_37bbec19-22b8-411c-901b-d89c92b0bd4d_0(17dd4e98e7bb6c3ce1933b5aaa2fc06f0e83e1e69e18e1b5b56b97db28967473): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"17dd4e98e7bb6c3ce1933b5aaa2fc06f0e83e1e69e18e1b5b56b97db28967473\" Netns:\"/var/run/netns/00dae05b-6e29-4633-9c63-e3053b70e26a\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=17dd4e98e7bb6c3ce1933b5aaa2fc06f0e83e1e69e18e1b5b56b97db28967473;K8S_POD_UID=37bbec19-22b8-411c-901b-d89c92b0bd4d\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/37bbec19-22b8-411c-901b-d89c92b0bd4d]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:46:16Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_37bbec19-22b8-411c-901b-d89c92b0bd4d_0(81a82de2a6eba1f53b1a8ce1733815bdae65dbfdbbcea26f8dcaf845d5e46bfb): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"81a82de2a6eba1f53b1a8ce1733815bdae65dbfdbbcea26f8dcaf845d5e46bfb\" Netns:\"/var/run/netns/ec69bf02-1789-4252-a210-f9fa8a9a1ef1\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=81a82de2a6eba1f53b1a8ce1733815bdae65dbfdbbcea26f8dcaf845d5e46bfb;K8S_POD_UID=37bbec19-22b8-411c-901b-d89c92b0bd4d\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/37bbec19-22b8-411c-901b-d89c92b0bd4d]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:47:18Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_37bbec19-22b8-411c-901b-d89c92b0bd4d_0(8f46192a22db8798a46b3a9622d9ce977746f10258d6dac88e788d7ffab9b1eb): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"8f46192a22db8798a46b3a9622d9ce977746f10258d6dac88e788d7ffab9b1eb\" Netns:\"/var/run/netns/523ade32-c29b-488e-8b31-f35a5d8f7c0b\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=8f46192a22db8798a46b3a9622d9ce977746f10258d6dac88e788d7ffab9b1eb;K8S_POD_UID=37bbec19-22b8-411c-901b-d89c92b0bd4d\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/37bbec19-22b8-411c-901b-d89c92b0bd4d]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:47:40Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.60/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:47:41Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:47:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:47:41Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:14Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 2","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:14Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"Started","message":"Started container cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"Created","message":"Created container: kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"Started","message":"Started container kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"Created","message":"Created container: cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"LeaderElection","message":"master-0_9803e223-1563-4526-8a1f-8c5785e9a3ae became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"Created","message":"Created container: kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"Started","message":"Started container kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"ControlPlaneTopology","message":"unable to get control plane topology, using HA cluster values for leader election: infrastructures.config.openshift.io \"cluster\" is forbidden: User \"system:kube-controller-manager\" cannot get resource \"infrastructures\" in API group \"config.openshift.io\" at the cluster scope","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"Created","message":"Created container: kube-controller-manager-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T17:48:15Z","reason":"Started","message":"Started container kube-controller-manager-recovery-controller","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215156562607016375 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T17:42:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000016010615156562607020232 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:36:48Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-8b68b9d9b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:36:49Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:40:16Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:40:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:40:18Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-8b68b9d9b-p72m2","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:37Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-p72m2 to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.26/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:39Z","reason":"LeaderElection","message":"kube-apiserver-operator-8b68b9d9b-p72m2_ca4240bc-925a-4257-b72d-4ee8e6174cc3 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:39Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:39Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:39Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:39Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:39Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:40Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to False (\"NodeControllerDegraded: All master nodes are ready\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"),EvaluationConditionsDetected set to False (\"All is well\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:41Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:42Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:42Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:42Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:42Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:42Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:42Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:42Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:42Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:42Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:42Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:44Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:44Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:44Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:44Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:45Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:45Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:46Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:46Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:46Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:46Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:46Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:46Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:46Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:46Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:47Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:47Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:48Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:48Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:48Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:48Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:48Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:48Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:48Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:49Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:49Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:49Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:49Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:49Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:50Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:50Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:50Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:53Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:03Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:04Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:07Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:09Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:11Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:13Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:16Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:19Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:21Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:22Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:42:27Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:48:00Z","reason":"BackOff","message":"Back-off restarting failed container kube-apiserver-operator in pod kube-apiserver-operator-8b68b9d9b-p72m2_openshift-kube-apiserver-operator(26575d68-0488-4dfa-a5d0-5016e481dba6)","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:48:12Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:48:12Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T17:48:12Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001237115156562607014374 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:42:21Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.41/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:42:22Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:42:23Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:42:23Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:42:54Z","reason":"Killing","message":"Stopping container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:42:54Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:43:12Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:43:12Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:43:26Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:43:26Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:43:26Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:44:13Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:44:13Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:44:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:55Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:55Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:55Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:55Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:56Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:56Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:56Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:56Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:56Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T17:45:57Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000003731615156562607016233 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:36:34Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-8544cbcf9c to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:36:44Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:40:15Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:40:17Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:40:17Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-8544cbcf9c-rws9x","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:37Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-8544cbcf9c-rws9x to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:53Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" in 708ms (708ms including waiting). Image size: 518384969 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"LeaderElection","message":"etcd-operator-8544cbcf9c-rws9x_f42bcd3b-80c7-4155-a20e-e6de9daf52d5 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:58Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:42:09Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:43:20Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.13:8443/healthz\": dial tcp 10.128.0.13:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:43:20Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.13:8443/healthz\": dial tcp 10.128.0.13:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:45:30Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.13:8443/healthz\": read tcp 10.128.0.2:53718-\u003e10.128.0.13:8443: read: connection reset by peer\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:45:30Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.13:8443/healthz\": read tcp 10.128.0.2:53718-\u003e10.128.0.13:8443: read: connection reset by peer","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:47:24Z","reason":"BackOff","message":"Back-off restarting failed container etcd-operator in pod etcd-operator-8544cbcf9c-rws9x_openshift-etcd-operator(0100a259-1358-45e8-8191-4e1f9a14ec89)","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:47:40Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:47:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T17:47:40Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000443715156562607016577 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T17:42:23Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-688fbbb854-6n26v to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T17:42:23Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-688fbbb854-6n26v","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T17:42:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-688fbbb854 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T17:42:28Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T17:42:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T17:42:37Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" in 9.016s (9.016s including waiting). Image size: 505345991 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T17:42:38Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T17:42:38Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T17:42:42Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000124015156562607015120 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T17:42:13Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T17:42:13Z","reason":"SuccessfulCreate","message":"Created pod: router-default-7dcf5569b5-m5dh4","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T17:42:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-7dcf5569b5 to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000023555415156562607020337 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:36:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-5885bfd7f4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:36:45Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:40:17Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:40:19Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:40:19Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-5885bfd7f4-8sxdf","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:37Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-5885bfd7f4-8sxdf to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.21/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:38Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:52Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:53Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" in 705ms (705ms including waiting). Image size: 513221333 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"LeaderElection","message":"authentication-operator-5885bfd7f4-8sxdf_f97cf4d0-2ab4-4879-90fc-3aa79363aa26 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:54Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+\\u00a0\\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+\\u00a0\\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:57Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-shts8\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-shts8\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:41:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:01Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:02Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:04Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\\"oauthConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+\\u00a0\\t\\t\\t\\\"templates\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+\\u00a0\\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"serverArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"servingInfo\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"cipherSuites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:07Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:07Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:08Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:12Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:12Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:12Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:12Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:16Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:16Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:22Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\n\\u00a0\\u00a0\\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n\\u00a0\\u00a0\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t\\\"namedCertificates\\\": []any{\\n+\\u00a0\\t\\t\\tmap[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:22Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:22Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:22Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:29Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:44Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:44Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:44Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:44Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:45Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"oauth-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:42:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.61.46:443/healthz\\\": dial tcp 172.30.61.46:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:43:40Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.21:8443/healthz\": dial tcp 10.128.0.21:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:43:40Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.21:8443/healthz\": dial tcp 10.128.0.21:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:47:24Z","reason":"BackOff","message":"Back-off restarting failed container authentication-operator in pod authentication-operator-5885bfd7f4-8sxdf_openshift-authentication-operator(c087ce06-a16b-41f4-ba93-8fccdee09003)","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:47:40Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:47:40Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T17:47:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" already present on machine","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015156562607016305 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-18T17:42:20Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-18T17:42:22Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003472315156562602014621 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":337,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-os-puller","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015156562601014102 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000005474215156562567014567 0ustar0000000000000000Mar 18 17:48:14.274432 master-0 kubenswrapper[7553]: E0318 17:48:14.274296 7553 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="46f265536aba6292ead501bc9b49f327" containerName="kube-controller-manager" Mar 18 17:48:32.520066 master-0 kubenswrapper[7553]: E0318 17:48:32.519053 7553 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="37bbec19-22b8-411c-901b-d89c92b0bd4d" containerName="installer" Mar 18 17:48:32.678082 master-0 kubenswrapper[7553]: E0318 17:48:32.675205 7553 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Mar 18 17:48:32.678082 master-0 kubenswrapper[7553]: E0318 17:48:32.675246 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/92153864-7959-4482-bf24-c8db36435fb5-machine-approver-tls podName:92153864-7959-4482-bf24-c8db36435fb5 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:33.175233188 +0000 UTC m=+403.321067861 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/92153864-7959-4482-bf24-c8db36435fb5-machine-approver-tls") pod "machine-approver-5c6485487f-z74t2" (UID: "92153864-7959-4482-bf24-c8db36435fb5") : secret "machine-approver-tls" not found Mar 18 17:48:32.678082 master-0 kubenswrapper[7553]: E0318 17:48:32.675887 7553 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Mar 18 17:48:32.678082 master-0 kubenswrapper[7553]: E0318 17:48:32.675945 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e0e04440-c08b-452d-9be6-9f70a4027c92-samples-operator-tls podName:e0e04440-c08b-452d-9be6-9f70a4027c92 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:33.175923278 +0000 UTC m=+403.321757951 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/e0e04440-c08b-452d-9be6-9f70a4027c92-samples-operator-tls") pod "cluster-samples-operator-85f7577d78-xnx8x" (UID: "e0e04440-c08b-452d-9be6-9f70a4027c92") : secret "samples-operator-tls" not found Mar 18 17:48:32.780628 master-0 kubenswrapper[7553]: E0318 17:48:32.779390 7553 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Mar 18 17:48:32.780628 master-0 kubenswrapper[7553]: E0318 17:48:32.779439 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/04cef0bd-f365-4bf6-864a-1895995015d6-cloud-credential-operator-serving-cert podName:04cef0bd-f365-4bf6-864a-1895995015d6 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:33.279423841 +0000 UTC m=+403.425258514 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/04cef0bd-f365-4bf6-864a-1895995015d6-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-744f9dbf77-djgn7" (UID: "04cef0bd-f365-4bf6-864a-1895995015d6") : secret "cloud-credential-operator-serving-cert" not found Mar 18 17:48:32.780628 master-0 kubenswrapper[7553]: E0318 17:48:32.779689 7553 secret.go:189] Couldn't get secret openshift-machine-api/control-plane-machine-set-operator-tls: secret "control-plane-machine-set-operator-tls" not found Mar 18 17:48:32.780628 master-0 kubenswrapper[7553]: E0318 17:48:32.779715 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/de189d27-4c60-49f1-9119-d1fde5c37b1e-control-plane-machine-set-operator-tls podName:de189d27-4c60-49f1-9119-d1fde5c37b1e nodeName:}" failed. No retries permitted until 2026-03-18 17:48:33.279706699 +0000 UTC m=+403.425541372 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "control-plane-machine-set-operator-tls" (UniqueName: "kubernetes.io/secret/de189d27-4c60-49f1-9119-d1fde5c37b1e-control-plane-machine-set-operator-tls") pod "control-plane-machine-set-operator-6f97756bc8-zdqtc" (UID: "de189d27-4c60-49f1-9119-d1fde5c37b1e") : secret "control-plane-machine-set-operator-tls" not found Mar 18 17:48:32.781483 master-0 kubenswrapper[7553]: E0318 17:48:32.781024 7553 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Mar 18 17:48:32.781483 master-0 kubenswrapper[7553]: E0318 17:48:32.781066 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/a94f7bff-ad61-4c53-a8eb-000a13f26971-cert podName:a94f7bff-ad61-4c53-a8eb-000a13f26971 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:33.281050126 +0000 UTC m=+403.426884799 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/a94f7bff-ad61-4c53-a8eb-000a13f26971-cert") pod "cluster-autoscaler-operator-866dc4744-l6hpt" (UID: "a94f7bff-ad61-4c53-a8eb-000a13f26971") : secret "cluster-autoscaler-operator-cert" not found Mar 18 17:48:32.884356 master-0 kubenswrapper[7553]: E0318 17:48:32.881902 7553 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Mar 18 17:48:32.884356 master-0 kubenswrapper[7553]: E0318 17:48:32.881954 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2d21e77e-8b61-4f03-8f17-941b7a1d8b1d-machine-api-operator-tls podName:2d21e77e-8b61-4f03-8f17-941b7a1d8b1d nodeName:}" failed. No retries permitted until 2026-03-18 17:48:33.381939105 +0000 UTC m=+403.527773778 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/2d21e77e-8b61-4f03-8f17-941b7a1d8b1d-machine-api-operator-tls") pod "machine-api-operator-6fbb6cf6f9-6x52p" (UID: "2d21e77e-8b61-4f03-8f17-941b7a1d8b1d") : secret "machine-api-operator-tls" not found Mar 18 17:48:33.188858 master-0 kubenswrapper[7553]: E0318 17:48:33.188695 7553 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Mar 18 17:48:33.191386 master-0 kubenswrapper[7553]: E0318 17:48:33.189416 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e0e04440-c08b-452d-9be6-9f70a4027c92-samples-operator-tls podName:e0e04440-c08b-452d-9be6-9f70a4027c92 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:34.188801291 +0000 UTC m=+404.334635964 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/e0e04440-c08b-452d-9be6-9f70a4027c92-samples-operator-tls") pod "cluster-samples-operator-85f7577d78-xnx8x" (UID: "e0e04440-c08b-452d-9be6-9f70a4027c92") : secret "samples-operator-tls" not found Mar 18 17:48:33.191386 master-0 kubenswrapper[7553]: E0318 17:48:33.189749 7553 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Mar 18 17:48:33.191386 master-0 kubenswrapper[7553]: E0318 17:48:33.189901 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/92153864-7959-4482-bf24-c8db36435fb5-machine-approver-tls podName:92153864-7959-4482-bf24-c8db36435fb5 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:34.189854151 +0000 UTC m=+404.335688824 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/92153864-7959-4482-bf24-c8db36435fb5-machine-approver-tls") pod "machine-approver-5c6485487f-z74t2" (UID: "92153864-7959-4482-bf24-c8db36435fb5") : secret "machine-approver-tls" not found Mar 18 17:48:33.292844 master-0 kubenswrapper[7553]: E0318 17:48:33.292183 7553 secret.go:189] Couldn't get secret openshift-machine-api/control-plane-machine-set-operator-tls: secret "control-plane-machine-set-operator-tls" not found Mar 18 17:48:33.292844 master-0 kubenswrapper[7553]: E0318 17:48:33.292252 7553 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Mar 18 17:48:33.292844 master-0 kubenswrapper[7553]: E0318 17:48:33.292313 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/de189d27-4c60-49f1-9119-d1fde5c37b1e-control-plane-machine-set-operator-tls podName:de189d27-4c60-49f1-9119-d1fde5c37b1e nodeName:}" failed. No retries permitted until 2026-03-18 17:48:34.292257093 +0000 UTC m=+404.438091766 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "control-plane-machine-set-operator-tls" (UniqueName: "kubernetes.io/secret/de189d27-4c60-49f1-9119-d1fde5c37b1e-control-plane-machine-set-operator-tls") pod "control-plane-machine-set-operator-6f97756bc8-zdqtc" (UID: "de189d27-4c60-49f1-9119-d1fde5c37b1e") : secret "control-plane-machine-set-operator-tls" not found Mar 18 17:48:33.292844 master-0 kubenswrapper[7553]: E0318 17:48:33.292329 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/a94f7bff-ad61-4c53-a8eb-000a13f26971-cert podName:a94f7bff-ad61-4c53-a8eb-000a13f26971 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:34.292323305 +0000 UTC m=+404.438157978 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/a94f7bff-ad61-4c53-a8eb-000a13f26971-cert") pod "cluster-autoscaler-operator-866dc4744-l6hpt" (UID: "a94f7bff-ad61-4c53-a8eb-000a13f26971") : secret "cluster-autoscaler-operator-cert" not found Mar 18 17:48:33.294127 master-0 kubenswrapper[7553]: E0318 17:48:33.294059 7553 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Mar 18 17:48:33.295316 master-0 kubenswrapper[7553]: E0318 17:48:33.295233 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/04cef0bd-f365-4bf6-864a-1895995015d6-cloud-credential-operator-serving-cert podName:04cef0bd-f365-4bf6-864a-1895995015d6 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:34.294106204 +0000 UTC m=+404.439940877 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/04cef0bd-f365-4bf6-864a-1895995015d6-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-744f9dbf77-djgn7" (UID: "04cef0bd-f365-4bf6-864a-1895995015d6") : secret "cloud-credential-operator-serving-cert" not found Mar 18 17:48:33.396506 master-0 kubenswrapper[7553]: E0318 17:48:33.396170 7553 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Mar 18 17:48:33.396506 master-0 kubenswrapper[7553]: E0318 17:48:33.396252 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2d21e77e-8b61-4f03-8f17-941b7a1d8b1d-machine-api-operator-tls podName:2d21e77e-8b61-4f03-8f17-941b7a1d8b1d nodeName:}" failed. No retries permitted until 2026-03-18 17:48:34.396231319 +0000 UTC m=+404.542065992 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/2d21e77e-8b61-4f03-8f17-941b7a1d8b1d-machine-api-operator-tls") pod "machine-api-operator-6fbb6cf6f9-6x52p" (UID: "2d21e77e-8b61-4f03-8f17-941b7a1d8b1d") : secret "machine-api-operator-tls" not found Mar 18 17:48:34.210171 master-0 kubenswrapper[7553]: E0318 17:48:34.209536 7553 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Mar 18 17:48:34.210171 master-0 kubenswrapper[7553]: E0318 17:48:34.209706 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/92153864-7959-4482-bf24-c8db36435fb5-machine-approver-tls podName:92153864-7959-4482-bf24-c8db36435fb5 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:36.209604019 +0000 UTC m=+406.355438692 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/92153864-7959-4482-bf24-c8db36435fb5-machine-approver-tls") pod "machine-approver-5c6485487f-z74t2" (UID: "92153864-7959-4482-bf24-c8db36435fb5") : secret "machine-approver-tls" not found Mar 18 17:48:34.211315 master-0 kubenswrapper[7553]: E0318 17:48:34.210242 7553 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Mar 18 17:48:34.211315 master-0 kubenswrapper[7553]: E0318 17:48:34.210300 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e0e04440-c08b-452d-9be6-9f70a4027c92-samples-operator-tls podName:e0e04440-c08b-452d-9be6-9f70a4027c92 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:36.210262817 +0000 UTC m=+406.356097490 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/e0e04440-c08b-452d-9be6-9f70a4027c92-samples-operator-tls") pod "cluster-samples-operator-85f7577d78-xnx8x" (UID: "e0e04440-c08b-452d-9be6-9f70a4027c92") : secret "samples-operator-tls" not found Mar 18 17:48:34.317493 master-0 kubenswrapper[7553]: E0318 17:48:34.311760 7553 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Mar 18 17:48:34.317493 master-0 kubenswrapper[7553]: E0318 17:48:34.311848 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/a94f7bff-ad61-4c53-a8eb-000a13f26971-cert podName:a94f7bff-ad61-4c53-a8eb-000a13f26971 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:36.311827396 +0000 UTC m=+406.457662069 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/a94f7bff-ad61-4c53-a8eb-000a13f26971-cert") pod "cluster-autoscaler-operator-866dc4744-l6hpt" (UID: "a94f7bff-ad61-4c53-a8eb-000a13f26971") : secret "cluster-autoscaler-operator-cert" not found Mar 18 17:48:34.317493 master-0 kubenswrapper[7553]: E0318 17:48:34.312591 7553 secret.go:189] Couldn't get secret openshift-machine-api/control-plane-machine-set-operator-tls: secret "control-plane-machine-set-operator-tls" not found Mar 18 17:48:34.317493 master-0 kubenswrapper[7553]: E0318 17:48:34.312633 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/de189d27-4c60-49f1-9119-d1fde5c37b1e-control-plane-machine-set-operator-tls podName:de189d27-4c60-49f1-9119-d1fde5c37b1e nodeName:}" failed. No retries permitted until 2026-03-18 17:48:36.312614088 +0000 UTC m=+406.458448761 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "control-plane-machine-set-operator-tls" (UniqueName: "kubernetes.io/secret/de189d27-4c60-49f1-9119-d1fde5c37b1e-control-plane-machine-set-operator-tls") pod "control-plane-machine-set-operator-6f97756bc8-zdqtc" (UID: "de189d27-4c60-49f1-9119-d1fde5c37b1e") : secret "control-plane-machine-set-operator-tls" not found Mar 18 17:48:34.317493 master-0 kubenswrapper[7553]: E0318 17:48:34.312695 7553 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Mar 18 17:48:34.317493 master-0 kubenswrapper[7553]: E0318 17:48:34.312715 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/04cef0bd-f365-4bf6-864a-1895995015d6-cloud-credential-operator-serving-cert podName:04cef0bd-f365-4bf6-864a-1895995015d6 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:36.31270925 +0000 UTC m=+406.458543923 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/04cef0bd-f365-4bf6-864a-1895995015d6-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-744f9dbf77-djgn7" (UID: "04cef0bd-f365-4bf6-864a-1895995015d6") : secret "cloud-credential-operator-serving-cert" not found Mar 18 17:48:34.414806 master-0 kubenswrapper[7553]: E0318 17:48:34.414698 7553 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Mar 18 17:48:34.414806 master-0 kubenswrapper[7553]: E0318 17:48:34.414781 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2d21e77e-8b61-4f03-8f17-941b7a1d8b1d-machine-api-operator-tls podName:2d21e77e-8b61-4f03-8f17-941b7a1d8b1d nodeName:}" failed. No retries permitted until 2026-03-18 17:48:36.414760552 +0000 UTC m=+406.560595225 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/2d21e77e-8b61-4f03-8f17-941b7a1d8b1d-machine-api-operator-tls") pod "machine-api-operator-6fbb6cf6f9-6x52p" (UID: "2d21e77e-8b61-4f03-8f17-941b7a1d8b1d") : secret "machine-api-operator-tls" not found Mar 18 17:48:36.241369 master-0 kubenswrapper[7553]: E0318 17:48:36.240920 7553 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Mar 18 17:48:36.241369 master-0 kubenswrapper[7553]: E0318 17:48:36.241079 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e0e04440-c08b-452d-9be6-9f70a4027c92-samples-operator-tls podName:e0e04440-c08b-452d-9be6-9f70a4027c92 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:40.241051718 +0000 UTC m=+410.386886401 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/e0e04440-c08b-452d-9be6-9f70a4027c92-samples-operator-tls") pod "cluster-samples-operator-85f7577d78-xnx8x" (UID: "e0e04440-c08b-452d-9be6-9f70a4027c92") : secret "samples-operator-tls" not found Mar 18 17:48:36.241369 master-0 kubenswrapper[7553]: E0318 17:48:36.241079 7553 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Mar 18 17:48:36.241369 master-0 kubenswrapper[7553]: E0318 17:48:36.241148 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/92153864-7959-4482-bf24-c8db36435fb5-machine-approver-tls podName:92153864-7959-4482-bf24-c8db36435fb5 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:40.241136901 +0000 UTC m=+410.386971594 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/92153864-7959-4482-bf24-c8db36435fb5-machine-approver-tls") pod "machine-approver-5c6485487f-z74t2" (UID: "92153864-7959-4482-bf24-c8db36435fb5") : secret "machine-approver-tls" not found Mar 18 17:48:36.342153 master-0 kubenswrapper[7553]: E0318 17:48:36.342124 7553 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Mar 18 17:48:36.342231 master-0 kubenswrapper[7553]: E0318 17:48:36.342124 7553 secret.go:189] Couldn't get secret openshift-machine-api/control-plane-machine-set-operator-tls: secret "control-plane-machine-set-operator-tls" not found Mar 18 17:48:36.342377 master-0 kubenswrapper[7553]: E0318 17:48:36.342198 7553 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Mar 18 17:48:36.342432 master-0 kubenswrapper[7553]: E0318 17:48:36.342222 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/04cef0bd-f365-4bf6-864a-1895995015d6-cloud-credential-operator-serving-cert podName:04cef0bd-f365-4bf6-864a-1895995015d6 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:40.342194775 +0000 UTC m=+410.488029468 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/04cef0bd-f365-4bf6-864a-1895995015d6-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-744f9dbf77-djgn7" (UID: "04cef0bd-f365-4bf6-864a-1895995015d6") : secret "cloud-credential-operator-serving-cert" not found Mar 18 17:48:36.342503 master-0 kubenswrapper[7553]: E0318 17:48:36.342477 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/de189d27-4c60-49f1-9119-d1fde5c37b1e-control-plane-machine-set-operator-tls podName:de189d27-4c60-49f1-9119-d1fde5c37b1e nodeName:}" failed. No retries permitted until 2026-03-18 17:48:40.342434372 +0000 UTC m=+410.488269075 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "control-plane-machine-set-operator-tls" (UniqueName: "kubernetes.io/secret/de189d27-4c60-49f1-9119-d1fde5c37b1e-control-plane-machine-set-operator-tls") pod "control-plane-machine-set-operator-6f97756bc8-zdqtc" (UID: "de189d27-4c60-49f1-9119-d1fde5c37b1e") : secret "control-plane-machine-set-operator-tls" not found Mar 18 17:48:36.342542 master-0 kubenswrapper[7553]: E0318 17:48:36.342520 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/a94f7bff-ad61-4c53-a8eb-000a13f26971-cert podName:a94f7bff-ad61-4c53-a8eb-000a13f26971 nodeName:}" failed. No retries permitted until 2026-03-18 17:48:40.342503404 +0000 UTC m=+410.488338117 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/a94f7bff-ad61-4c53-a8eb-000a13f26971-cert") pod "cluster-autoscaler-operator-866dc4744-l6hpt" (UID: "a94f7bff-ad61-4c53-a8eb-000a13f26971") : secret "cluster-autoscaler-operator-cert" not found Mar 18 17:48:36.444604 master-0 kubenswrapper[7553]: E0318 17:48:36.444565 7553 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Mar 18 17:48:36.444645 master-0 kubenswrapper[7553]: E0318 17:48:36.444637 7553 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2d21e77e-8b61-4f03-8f17-941b7a1d8b1d-machine-api-operator-tls podName:2d21e77e-8b61-4f03-8f17-941b7a1d8b1d nodeName:}" failed. No retries permitted until 2026-03-18 17:48:40.444616558 +0000 UTC m=+410.590451231 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/2d21e77e-8b61-4f03-8f17-941b7a1d8b1d-machine-api-operator-tls") pod "machine-api-operator-6fbb6cf6f9-6x52p" (UID: "2d21e77e-8b61-4f03-8f17-941b7a1d8b1d") : secret "machine-api-operator-tls" not foundconfig/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515156562566023236 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115156562566025446 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715156562566025155 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715156562566025146 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000060615156562566022274 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515156562566026722 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115156562566023425 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115156562566023221 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115156562566025511 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- aggregated/unused_machine_configs_count.json0000640000000000000000000000004115156562566020150 0ustar0000000000000000{"unused_machineconfigs_count":9}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715156562566017554 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-18T17:42:12Z","not_after":"2028-03-17T17:42:13Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-18T17:42:12Z","not_after":"2028-03-17T17:42:13Z","controllers":[]}]config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315156562566023463 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"94d8156e-e38a-40dd-b865-00638e5924dc","resourceVersion":"4279","generation":1,"creationTimestamp":"2026-03-18T17:41:54Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-18T17:41:54Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-18T17:41:54Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015156562566022066 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"6f8ade42-c56b-4596-81fd-5484d7d0e917","resourceVersion":"4228","generation":1,"creationTimestamp":"2026-03-18T17:41:54Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-18T17:41:54Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-18T17:41:54Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-18T17:41:54Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}events/openshift-cluster-version.json0000640000000000000000000002231415156562566016623 0ustar0000000000000000{"items":[{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:35:46Z","reason":"LeaderElection","message":"master-0_d591a03a-8c04-40ea-bb2b-0976c11f6d8e became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:35:59Z","reason":"LeaderElection","message":"master-0_67e8dd1d-ecbc-4df3-b1ab-0af6c7c6fa30 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:36:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-56d8475767 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:36:13Z","reason":"LeaderElection","message":"master-0_f3864c6e-6b31-41c8-8de0-7af4e040c1a5 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:36:15Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:36:15Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:36:17Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:36:47Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-56d8475767-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:40:15Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-56d8475767-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:40:17Z","reason":"Scheduled","message":"Successfully assigned openshift-cluster-version/cluster-version-operator-56d8475767-lqvvj to master-0","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:40:17Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-56d8475767-lqvvj","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:41:26Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:41:58Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:26Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" in 18.802s (18.802s including waiting). Image size: 517999161 bytes.","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:29Z","reason":"LeaderElection","message":"master-0_fb9b39d3-21a4-4f6b-94f1-88a56c6b475a became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:29Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:31Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:31Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:33Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:43Z","reason":"ScalingReplicaSet","message":"Scaled down replica set cluster-version-operator-56d8475767 to 0 from 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:43Z","reason":"SuccessfulDelete","message":"Deleted pod: cluster-version-operator-56d8475767-lqvvj","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:43Z","reason":"Killing","message":"Stopping container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:43Z","reason":"LeaderElection","message":"master-0_fb9b39d3-21a4-4f6b-94f1-88a56c6b475a stopped leading","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:50Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-7d58488df to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:51Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-7d58488df-l48xm","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:51Z","reason":"Scheduled","message":"Successfully assigned openshift-cluster-version/cluster-version-operator-7d58488df-l48xm to master-0","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:52Z","reason":"LeaderElection","message":"master-0_39aefc83-f62e-4aa0-b342-6aabd327f63c became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:53Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:42:53Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:48:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:48:05Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:48:05Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:48:05Z","reason":"LeaderElection","message":"master-0_39aefc83-f62e-4aa0-b342-6aabd327f63c stopped leading","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:48:05Z","reason":"LeaderElection","message":"master-0_d0a99f48-6e09-4c83-8cc3-f945615582f8 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:48:07Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:48:07Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-03-18T17:48:08Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" architecture=\"amd64\"","type":"Normal"}]}config/pod/openshift-cluster-version/cluster-version-operator-7d58488df-l48xm.json0000640000000000000000000001402415156562566026557 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-7d58488df-l48xm","generateName":"cluster-version-operator-7d58488df-","namespace":"openshift-cluster-version","uid":"fdab27a1-1d7a-4dc5-b828-eba3f57592dd","resourceVersion":"9614","creationTimestamp":"2026-03-18T17:42:51Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"7d58488df"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-7d58488df","uid":"3dd82cdb-18dd-4d63-b79e-49f854678caf","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"imagePullSecrets":[{"name":"default-dockercfg-tns2v"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:52Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:51Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:06Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:06Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:51Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T17:42:51Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-18T17:48:05Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T17:42:51Z","finishedAt":"2026-03-18T17:48:05Z","containerID":"cri-o://5eda9ef28d74f5cd7a10971a5854c8a51a0c32becadb69afd3686ca34d1563e1"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","containerID":"cri-o://b533f593b28cafb60fbcf6432d0aa3477e72d3d1f721e9b883b828b9059da814","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415156562566011043 0ustar000000000000000016f5c049-38f2-4bb7-9907-94c4982dab33config/version.json0000640000000000000000000000526615156562566013117 0ustar0000000000000000{"metadata":{"name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","resourceVersion":"9703","generation":2,"creationTimestamp":"2026-03-18T17:35:53Z"},"spec":{"clusterID":"16f5c049-38f2-4bb7-9907-94c4982dab33","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","url":"https://access.redhat.com/errata/RHSA-2026:3905","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-18T17:36:17Z","completionTime":null,"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","verified":false}],"observedGeneration":2,"versionHash":"Uw6h6T7stl0=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-18T17:36:17Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-18T17:36:17Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-18T17:36:17Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-18T17:36:17Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T17:36:17Z"},{"type":"Failing","status":"False","lastTransitionTime":"2026-03-18T17:48:08Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T17:36:17Z","message":"Working towards 4.18.35: 638 of 908 done (70% complete)"}],"availableUpdates":null}}config/clusteroperator/storage.json0000640000000000000000000000131215156562566016317 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"0f0af7fe-3dd1-4844-b54a-28ed72e8f96b","resourceVersion":"812","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315156562566016677 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"11ca0c05-d60d-4f43-86cf-7db801020ebe","resourceVersion":"5033","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:00Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:41:57Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:41:57Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T17:41:54Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000305115156562566024675 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"1fc97ff4-0d85-48e7-a678-0b0c7376f237","resourceVersion":"9555","generation":1,"creationTimestamp":"2026-03-18T17:36:18Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:42Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T17:42:42Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: InstallCheckFailed, message: install timeout"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T17:48:03Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:42:43Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515156562566023475 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"61a70fb5-4a61-4291-adb4-97127ccd1dbe","resourceVersion":"9166","generation":1,"creationTimestamp":"2026-03-18T17:36:18Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:42Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:47:25Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:42Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:42:42Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115156562566022061 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"de64d5aa-3ae4-4e66-adce-3ed83c0b1c1f","resourceVersion":"7823","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:42Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:42Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:42Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:42:42Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315156562566020323 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"429a1da8-d2d1-46e8-b78c-6214977a352d","resourceVersion":"784","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000377215156562566022457 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"5d08c263-104a-4567-80ee-1e4b52be8ad0","resourceVersion":"7466","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T17:41:59Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 5, desired generation is 6.\nProgressing: deployment/route-controller-manager: observed generation is 4, desired generation is 5."},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:35Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:41:59Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215156562566020655 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"c3200318-3fe1-467f-b825-0e9bb6a9770a","resourceVersion":"7730","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:37Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T17:41:54Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"openshift-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001762615156562566015461 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"5b64bc79-0f8d-4059-845a-1e0e512ca423","resourceVersion":"9081","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:05Z","reason":"AsExpected","message":"OperatorcontrollerDeploymentOperatorControllerControllerManagerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get olms.operator.openshift.io cluster)\nCatalogdDeploymentCatalogdControllerManagerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get olms.operator.openshift.io cluster)\nOperatorControllerStaticResourcesDegraded: \"operator-controller/15-rolebinding-openshift-operator-controller-operator-controller-manager-rolebinding.yml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io operator-controller-manager-rolebinding)\nOperatorControllerStaticResourcesDegraded: \"operator-controller/16-clusterrolebinding-operator-controller-manager-rolebinding.yml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io operator-controller-manager-rolebinding)\nOperatorControllerStaticResourcesDegraded: \"operator-controller/17-clusterrolebinding-operator-controller-proxy-rolebinding.yml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io operator-controller-proxy-rolebinding)\nOperatorControllerStaticResourcesDegraded: \"operator-controller/18-configmap-openshift-operator-controller-operator-controller-trusted-ca-bundle.yml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps operator-controller-trusted-ca-bundle)\nOperatorControllerStaticResourcesDegraded: "},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:51Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:51Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:42:05Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T17:42:05Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115156562566017105 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"96497791-e37b-4e2a-ad65-f8c022a18162","resourceVersion":"7020","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:30Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.35\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:32Z","reason":"AsExpected","message":"Cluster version is \"4.18.35\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:29Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003615415156562566016360 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"f764fe09-5f22-4b06-bdcb-d08bfad3ddf0","resourceVersion":"8069","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-18T17:40:42Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:40:31Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:40:31Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:43Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:41:53Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-flatfile-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715156562566017051 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"7876e54b-b639-4191-9426-a3c136b149ca","resourceVersion":"7619","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-18T17:42:38Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-18T17:42:38Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T17:42:38Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:42:38Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315156562566017146 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"109a0cf5-6259-4540-a363-39db6effa73b","resourceVersion":"7701","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:39Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.35"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:39Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:42:39Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:39Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015156562566017520 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"3a204268-4360-43a2-9777-b4cf0570784c","resourceVersion":"796","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000146715156562566020126 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"c4b1a71d-ac9c-4a06-b4de-054e4d777407","resourceVersion":"755","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000263415156562566017036 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"0134c61a-efeb-445d-b183-056e30ab0778","resourceVersion":"703","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","name":""},{"group":"machine.openshift.io","resource":"machinesets","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddresses","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddressclaims","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000532115156562566022554 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"917fe788-e344-4b1b-a4cc-3c510d554f82","resourceVersion":"9071","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:08Z","reason":"AsExpected","message":"KubeStorageVersionMigratorStaticResourcesDegraded: \"kube-storage-version-migrator/namespace.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-kube-storage-version-migrator)\nKubeStorageVersionMigratorStaticResourcesDegraded: \"kube-storage-version-migrator/serviceaccount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts kube-storage-version-migrator-sa)\nKubeStorageVersionMigratorStaticResourcesDegraded: \"kube-storage-version-migrator/roles.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io storage-version-migration-migrator)\nKubeStorageVersionMigratorStaticResourcesDegraded: \nKubeStorageVersionMigratorDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps migrator)"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:29Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:29Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:42:08Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T17:42:08Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615156562566017566 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"55c48e06-aecb-4231-855e-31e1f3c54af1","resourceVersion":"7174","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T17:42:11Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715156562566021407 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"438dd0df-69bc-4896-8d09-314fbf3d32c5","resourceVersion":"8592","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T17:42:31Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T17:41:56Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715156562566017614 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"a357ab56-ba87-4d12-a4fb-118233c51b7d","resourceVersion":"6624","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:41:40Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T17:42:23Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T17:41:41Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:41:40Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-18T17:41:40Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415156562566016506 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"62df43f8-43b9-4ab7-9e9e-6be2b7c292fe","resourceVersion":"811","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000456715156562566016344 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"b9381a3f-f927-4ffc-b676-af12bcb9e70c","resourceVersion":"6650","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:24Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T17:42:13Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:24Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:42:13Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-18T17:42:13Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715156562566017611 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"6fd4f08e-cef8-4a25-89b6-a58039ef2b75","resourceVersion":"785","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015156562566015603 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"3fa0d017-846d-4553-a6b7-7348e34237e0","resourceVersion":"5987","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T17:42:11Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515156562566015453 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"90a2d47c-d074-495b-b964-a2e9a2bd67c5","resourceVersion":"8711","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:51Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:13Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:51Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:42:12Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000552615156562566021462 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"12885a01-6aef-4134-9d08-d95e659dae8f","resourceVersion":"9070","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:41:54Z","reason":"AsExpected","message":"WebhookRemovalControllerDegraded: Timeout: request did not complete within requested timeout - context deadline exceeded\nCSISnapshotControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps csi-snapshot-controller)\nCSISnapshotGuestStaticResourceControllerDegraded: \"volumesnapshots.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io volumesnapshots.snapshot.storage.k8s.io)\nCSISnapshotGuestStaticResourceControllerDegraded: \"volumesnapshotcontents.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io volumesnapshotcontents.snapshot.storage.k8s.io)\nCSISnapshotGuestStaticResourceControllerDegraded: \"volumesnapshotclasses.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get customresourcedefinitions.apiextensions.k8s.io volumesnapshotclasses.snapshot.storage.k8s.io)\nCSISnapshotGuestStaticResourceControllerDegraded: "},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:41:59Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:41:59Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T17:41:54Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"csi-snapshot-controller","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000154215156562566021630 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"f98746db-7254-43ce-8ed5-5697bf17a664","resourceVersion":"706","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215156562566016315 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"8424b1d3-9541-411a-b368-2c0b323a8896","resourceVersion":"809","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615156562566017755 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"c7e52920-f991-45bd-9111-ea1939289179","resourceVersion":"5011","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:00Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:00Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:00Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:42:00Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T17:42:00Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000164415156562566020504 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"a0b144cd-3b5f-4b86-a9f1-6759790a385e","resourceVersion":"795","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","name":""},{"group":"autoscaling.openshift.io","resource":"machineautoscalers","name":""}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000001520715156562566020101 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"1c7443b9-7701-40ab-b78b-a1a088f33b8b","resourceVersion":"1962","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:36:20Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:36:20Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:36:20Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:36:20Z"}],"versions":[{"name":"operator","version":""}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715156562566021565 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"c7c1df54-485b-4564-a9fe-1ccab6729b03","resourceVersion":"693","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015156562566016615 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"f7307193-e4ee-4fcb-84ce-af32a8e8aedc","resourceVersion":"7575","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:38Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:38Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:38Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:42:38Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-18T17:42:38Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000772615156562566017711 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"766acc7d-83e5-4057-948f-1447cd0e3b55","resourceVersion":"8460","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.61.46:443/healthz\": dial tcp 172.30.61.46:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T17:42:45Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T17:41:56Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.42:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.42:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.61.46:443/healthz\": dial tcp 172.30.61.46:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T17:41:55Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"oauth-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/running_containers.json0000640000000000000000000000763615156562566015342 0ustar0000000000000000{"images":{"0":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","1":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","10":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","11":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","12":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","13":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","14":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","15":"registry.redhat.io/redhat/community-operator-index:v4.18","16":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","17":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","18":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","19":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","2":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","20":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","21":"sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","22":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","23":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","24":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","25":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","26":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","27":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","28":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","29":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","3":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","30":"registry.redhat.io/redhat/redhat-operator-index:v4.18","31":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","32":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","33":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","34":"sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","35":"sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","36":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","37":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","38":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","39":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","4":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","40":"registry.redhat.io/redhat/certified-operator-index:v4.18","41":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","42":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","43":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","44":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","45":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","46":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","5":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","6":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","7":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","8":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","9":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458"},"containers":{"2026-03":{"0":8,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":1,"16":1,"17":1,"18":1,"19":1,"2":7,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"5":4,"6":2,"7":2,"8":2,"9":2}}}config/pod/openshift-service-ca-operator/service-ca-operator-b865698dc-5zj8r.json0000640000000000000000000001610415156562566026146 0ustar0000000000000000{"metadata":{"name":"service-ca-operator-b865698dc-5zj8r","generateName":"service-ca-operator-b865698dc-","namespace":"openshift-service-ca-operator","uid":"c355c750-ae2f-49fa-9a16-8fb4f688853e","resourceVersion":"9632","creationTimestamp":"2026-03-18T17:40:19Z","labels":{"app":"service-ca-operator","pod-template-hash":"b865698dc"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"service-ca-operator-b865698dc","uid":"16d7ac45-9cbd-461e-b6f0-42f60ee45e58","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"service-ca-operator-config","defaultMode":420}},{"name":"kube-api-access-zfnqp","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"service-ca-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","command":["service-ca-operator","operator"],"args":["--config=/var/run/configmaps/config/operator-config.yaml","-v=2"],"env":[{"name":"CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"}],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-zfnqp","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"service-ca-operator","serviceAccount":"service-ca-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c17"},"runAsUser":1001,"runAsGroup":1001,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:12Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:12Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"service-ca-operator","state":{"running":{"startedAt":"2026-03-18T17:48:11Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 17:46:16.481162 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 17:46:16.481421 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 17:46:16.483497 1 observer_polling.go:159] Starting file observer\nI0318 17:46:16.483930 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0318 17:46:16.483945 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nW0318 17:47:16.492649 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0318 17:47:16.492935 1 builder.go:304] service-ca-operator version -\nI0318 17:47:16.493892 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0318 17:47:46.785773 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-service-ca-operator/leases/service-ca-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-18T17:46:16Z","finishedAt":"2026-03-18T17:47:46Z","containerID":"cri-o://ebe23adafc49efd64f86fbe53ef0b2cf71f92ee87bec64f94def1d1fde4df324"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","containerID":"cri-o://82b3c41b778f6b2cb0358e27e4513c9d6911408756eafe9881b278fd4128f2db","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-zfnqp","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}operator-controller-controller-manager-57777556ff-bk26c.json0000640000000000000000000002474315156562566032133 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-57777556ff-bk26c","generateName":"operator-controller-controller-manager-57777556ff-","namespace":"openshift-operator-controller","uid":"efbcb147-d077-4749-9289-1682daccb657","resourceVersion":"9111","creationTimestamp":"2026-03-18T17:42:23Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"57777556ff"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.43/23\"],\"mac_address\":\"0a:58:0a:80:00:2b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.43/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.43\"\n ],\n \"mac\": \"0a:58:0a:80:00:2b\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-57777556ff","uid":"0490af6b-a546-4288-948c-76ecdf03d450","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-vqrdl","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-vqrdl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-vqrdl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.43","podIPs":[{"ip":"10.128.0.43"}],"startTime":"2026-03-18T17:42:23Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-18T17:42:30Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://c8bf797960855c96a7dd1015a59ba17f923918f9eedf49a7f51a1e737f4065a2","started":true,"volumeMounts":[{"name":"kube-api-access-vqrdl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-18T17:45:42Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"erKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"7523f711-0642-491e-a1bd-0d53a86b1fad\"\nI0318 17:42:51.281061 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"7523f711-0642-491e-a1bd-0d53a86b1fad\"\nI0318 17:42:51.291304 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"de965c88-8618-4b6f-aa20-e2f18dbd6b64\"\nI0318 17:42:51.291363 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"de965c88-8618-4b6f-aa20-e2f18dbd6b64\"\nE0318 17:43:29.889214 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0318 17:44:29.892564 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0318 17:44:42.886149 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0318 17:44:42.886328 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-18T17:42:29Z","finishedAt":"2026-03-18T17:44:42Z","containerID":"cri-o://b1d92bc61050e9dcfcb1bd9705c2f2b94007d572857fef98c987e76770e1ad13"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","containerID":"cri-o://e2d7bd945ff62383c4a337619ff4a53c695923ff63d0ce2cd5a9cb7b46a58867","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-vqrdl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-7bd846bfc4-dxxbl.json0000640000000000000000000002325715156562566025647 0ustar0000000000000000{"metadata":{"name":"network-operator-7bd846bfc4-dxxbl","generateName":"network-operator-7bd846bfc4-","namespace":"openshift-network-operator","uid":"14a0661b-7bde-4e22-a9a9-5e3fb24df77f","resourceVersion":"9119","creationTimestamp":"2026-03-18T17:40:18Z","labels":{"name":"network-operator","pod-template-hash":"7bd846bfc4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7bd846bfc4","uid":"3553b0d7-dd3b-41a8-bfd1-89bec3cb3c7d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-2pqww","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:02f0aa65dfd2a58e13248b4e2078caec450fa2bdbacb3afeb34d1de30c909b0f"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:896642a5bdda0cdbeccb0293d3de85f8882ac72678df8d12fb501fd3367982af"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b6140aa21678d5652c4d09e21eab5dfad35af30902b705c70f72a384e43868ac"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da26695a0ab94eddc0841bf2ed51b30921e2cdc2a9a5acd0d951081de67f1a97"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a22978e1669cdbaeee6ec0800f83559b56a2344f1c003f8cd60f27fac939680e"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-2pqww","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:40:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:40:22Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:40:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T17:40:22Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-18T17:47:24Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 17:45:42.596984 1 cmd.go:250] Using service-serving-cert provided certificates\nI0318 17:45:42.597202 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 17:45:42.597976 1 observer_polling.go:159] Starting file observer\nW0318 17:46:42.605801 1 builder.go:266] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods network-operator-7bd846bfc4-dxxbl)\nI0318 17:46:42.606147 1 builder.go:298] network-operator version 4.18.0-202603040549.p2.g8df9d04.assembly.stream.el9-8df9d04-8df9d04f3019ff6e0a4c51504601e8a73b4322e3\nF0318 17:47:12.941607 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-operator/leases/network-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-18T17:45:42Z","finishedAt":"2026-03-18T17:47:12Z","containerID":"cri-o://a6ebfcc622558a7e545ac685d6d46ff4d61a7219bfcb2c7a5f468d332911df22"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","containerID":"cri-o://34974a400194e4abf23a570b3bcaf62e9c0cf2c55d12e3ded0eb4a493b533868","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-2pqww","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-7s68k.json0000640000000000000000000002463315156562566025576 0ustar0000000000000000{"metadata":{"name":"network-node-identity-7s68k","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"9875ed82-813c-483d-8471-8f9b74b774ee","resourceVersion":"9130","creationTimestamp":"2026-03-18T17:41:00Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"5d8cf8bd5d","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"9cde242a-bf5a-46ae-972c-43ea2f953a89","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-76j8w","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-76j8w","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-76j8w","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:16Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:00Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:45:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:45:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:00Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T17:41:00Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-18T17:44:34Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"wgzr\"} reason=\"CSRApproved\"\nI0318 17:41:23.323868 1 approver.go:230] Finished syncing CSR csr-nwgzr for master-0 node in 693.809509ms\nI0318 17:41:23.325597 1 approver.go:230] Finished syncing CSR csr-nwgzr for unknown node in 112.483µs\nI0318 17:41:24.030093 1 approver.go:230] Finished syncing CSR csr-nwgzr for unknown node in 77.852µs\nI0318 17:41:36.220477 1 recorder.go:104] \"CSR \\\"csr-ltpl4\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-ltpl4\"} reason=\"CSRApproved\"\nI0318 17:41:36.226769 1 approver.go:230] Finished syncing CSR csr-ltpl4 for master-0 node in 6.960343ms\nI0318 17:41:36.226913 1 approver.go:230] Finished syncing CSR csr-ltpl4 for unknown node in 80.701µs\nI0318 17:41:36.233637 1 approver.go:230] Finished syncing CSR csr-ltpl4 for unknown node in 60.171µs\nE0318 17:43:11.565648 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0318 17:43:26.565632 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0318 17:43:26.565765 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0318 17:43:41.567321 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0318 17:43:41.567511 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-03-18T17:41:16Z","finishedAt":"2026-03-18T17:43:41Z","containerID":"cri-o://e68d50794bc18082c3da1be336c93731deac7bad0cc308995bf349c65577d305"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://d6933300553a8b09299df5113bf7cc86680b024bf430a5e7f3a091b6af9ab04a","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-76j8w","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-18T17:41:15Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://8f717b6ed059618cb85325de3ace977a636bd1e6836d5a76c011b0e857bb327e","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-76j8w","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215156562566026273 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"59bfd9fc-87c1-4fc5-8478-59fb243dc1a8","resourceVersion":"4017","creationTimestamp":"2026-03-18T17:40:31Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.mirror":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.seen":"2026-03-18T17:39:43.468136855Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"6acd4a61-9d80-4f54-90a7-4ba0eb46353d","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:50Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:50Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:50Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:50Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:50Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T17:41:50Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T17:39:47Z","finishedAt":"2026-03-18T17:39:47Z","containerID":"cri-o://3803a5540326c74452858cec12bf5343a5ecb670acc1d4e7c87a18dad91b712b"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://3803a5540326c74452858cec12bf5343a5ecb670acc1d4e7c87a18dad91b712b","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-18T17:40:31Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0318 17:40:04.963496 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0318 17:40:04.963621 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0318 17:40:04.964777 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-18T17:40:04Z","finishedAt":"2026-03-18T17:40:04Z","containerID":"cri-o://7b9bddc18b37dc8b661d9d8aa6fa9e351c2bd5fe2e18de32692f6b5ce1bb25c8"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://43d0194c7af8a79987b694f6624dcbd9737a923184624c98fa52f07e27abb8b3","started":true}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/cluster-baremetal-operator-6f69995874-dh5zl.json0000640000000000000000000002062215156562566026047 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-operator-6f69995874-dh5zl","generateName":"cluster-baremetal-operator-6f69995874-","namespace":"openshift-machine-api","uid":"37b3753f-bf4f-4a9e-a4a8-d58296bada79","resourceVersion":"9131","creationTimestamp":"2026-03-18T17:40:18Z","labels":{"k8s-app":"cluster-baremetal-operator","pod-template-hash":"6f69995874"},"annotations":{"capability.openshift.io/name":"baremetal","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.11/23\"],\"mac_address\":\"0a:58:0a:80:00:0b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.11/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.11\"\n ],\n \"mac\": \"0a:58:0a:80:00:0b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-baremetal-operator-6f69995874","uid":"7e590840-17d2-4aa8-a4ed-15058ae3726e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cert","secret":{"secretName":"cluster-baremetal-webhook-server-cert","defaultMode":420}},{"name":"config","configMap":{"name":"baremetal-kube-rbac-proxy","defaultMode":420}},{"name":"cluster-baremetal-operator-tls","secret":{"secretName":"cluster-baremetal-operator-tls","defaultMode":420}},{"name":"images","configMap":{"name":"cluster-baremetal-operator-images","defaultMode":420}},{"name":"kube-api-access-zwlxb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-baremetal-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","command":["/usr/bin/cluster-baremetal-operator"],"args":["--enable-leader-election"],"ports":[{"name":"webhook-server","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"METRICS_PORT","value":"8080"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"cert","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/tls"},{"name":"images","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/images"},{"name":"kube-api-access-zwlxb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}},{"name":"baremetal-kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://localhost:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--config-file=/etc/baremetal-kube-rbac-proxy/config-file.yaml","--logtostderr=true","--v=10"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-zwlxb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-baremetal-operator","serviceAccount":"cluster-baremetal-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c14"},"runAsUser":65534,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:38Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.11","podIPs":[{"ip":"10.128.0.11"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"baremetal-kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-18T17:42:38Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://e229bdd7fc0be3132bf6c41375784bfa193044dc824c60fd13a2faab5acbb534","started":true,"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-zwlxb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"cluster-baremetal-operator","state":{"running":{"startedAt":"2026-03-18T17:47:24Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"E0318 17:46:42.476475 1 main.go:144] \"unable to get enabled features\" err=\"unable to determine Platform: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster)\"\n","startedAt":"2026-03-18T17:45:42Z","finishedAt":"2026-03-18T17:46:42Z","containerID":"cri-o://fd1baed9e081b7d0a16ba577c3675952403bd2f32763aeb842989654f0b5e115"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","containerID":"cri-o://80c5f3220064c232d03dadbc88c1a47282c553de28295165f3109e332825aa0f","started":true,"volumeMounts":[{"name":"cert","mountPath":"/etc/cluster-baremetal-operator/tls","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"images","mountPath":"/etc/cluster-baremetal-operator/images","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-zwlxb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-66b84d69b-qb7n6.json0000640000000000000000000002454415156562566025206 0ustar0000000000000000{"metadata":{"name":"ingress-operator-66b84d69b-qb7n6","generateName":"ingress-operator-66b84d69b-","namespace":"openshift-ingress-operator","uid":"7e64a377-f497-4416-8f22-d5c7f52e0b65","resourceVersion":"9124","creationTimestamp":"2026-03-18T17:40:18Z","labels":{"name":"ingress-operator","pod-template-hash":"66b84d69b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.22/23\"],\"mac_address\":\"0a:58:0a:80:00:16\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.22/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.22\"\n ],\n \"mac\": \"0a:58:0a:80:00:16\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-66b84d69b","uid":"92505450-1614-4408-a80e-77bc26b93064","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-sclm5","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-sclm5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-sclm5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:12Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.22","podIPs":[{"ip":"10.128.0.22"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-18T17:47:24Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"urityPolicy\\\", \\\"DNSNameResolver\\\", \\\"DynamicResourceAllocation\\\", \\\"EtcdBackendQuota\\\", \\\"EventedPLEG\\\", \\\"Example\\\", \\\"ExternalOIDC\\\", \\\"ExternalOIDCWithUIDAndExtraClaimMappings\\\", \\\"GCPClusterHostedDNS\\\", \\\"GatewayAPI\\\", \\\"ImageStreamImportMode\\\", \\\"IngressControllerDynamicConfigurationManager\\\", \\\"InsightsConfig\\\", \\\"InsightsConfigAPI\\\", \\\"InsightsOnDemandDataGather\\\", \\\"InsightsRuntimeExtractor\\\", \\\"MachineAPIMigration\\\", \\\"MachineAPIOperatorDisableMachineHealthCheckController\\\", \\\"MachineAPIProviderOpenStack\\\", \\\"MachineConfigNodes\\\", \\\"MaxUnavailableStatefulSet\\\", \\\"MetricsCollectionProfiles\\\", \\\"MinimumKubeletVersion\\\", \\\"MixedCPUsAllocation\\\", \\\"MultiArchInstallAzure\\\", \\\"NodeSwap\\\", \\\"NutanixMultiSubnets\\\", \\\"OVNObservability\\\", \\\"OpenShiftPodSecurityAdmission\\\", \\\"PinnedImages\\\", \\\"PlatformOperators\\\", \\\"ProcMountType\\\", \\\"RouteAdvertisements\\\", \\\"RouteExternalCertificate\\\", \\\"ServiceAccountTokenNodeBinding\\\", \\\"SignatureStores\\\", \\\"SigstoreImageVerification\\\", \\\"TranslateStreamCloseWebsocketRequests\\\", \\\"UpgradeStatus\\\", \\\"UserNamespacesPodSecurityStandards\\\", \\\"UserNamespacesSupport\\\", \\\"VSphereMultiNetworks\\\", \\\"VolumeAttributesClass\\\", \\\"VolumeGroupSnapshot\\\"}},Source:EventSource{Component:cluster-ingress-operator,Host:,},FirstTimestamp:2026-03-18 17:45:34.641230518 +0000 UTC m=+60.202493377,LastTimestamp:2026-03-18 17:45:34.641230518 +0000 UTC m=+60.202493377,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cluster-ingress-operator,ReportingInstance:,}\"\n2026-03-18T17:46:34.678Z\tERROR\toperator.init\truntime/asm_amd64.s:1695\terror stopping metrics listener\n2026-03-18T17:46:34.678Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n2026-03-18T17:46:34.678Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed fetching infrastructure config: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster)\"}\n","startedAt":"2026-03-18T17:44:34Z","finishedAt":"2026-03-18T17:46:34Z","containerID":"cri-o://02b88785366f3ca67c38ae3fa046b86fa7c95b60c40b090f66977aa12f1b78cb"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","containerID":"cri-o://7ee6b0cddd340e9ac4b37b541379d515766ed427e5cb173553e9eea6ace8c5a9","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-sclm5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-18T17:42:12Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://e9fc20131fe3301f3975c8ec80aa5b69c08756ea86094187749bed1e0e04517c","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-sclm5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-8c94f4649-hpsbd.json0000640000000000000000000001660615156562566033457 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8c94f4649-hpsbd","generateName":"openshift-controller-manager-operator-8c94f4649-","namespace":"openshift-controller-manager-operator","uid":"9a240ab7-a1d5-4e9a-96f3-4590681cc7ed","resourceVersion":"9143","creationTimestamp":"2026-03-18T17:40:17Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8c94f4649"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8c94f4649","uid":"29b8464b-a8ee-4926-994c-e305cb00e4bc","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-l5tw2","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-l5tw2","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c4"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:41Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:41Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-18T17:47:40Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 17:45:42.529255 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 17:45:42.529437 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 17:45:42.529958 1 observer_polling.go:159] Starting file observer\nW0318 17:46:42.538537 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-8c94f4649-hpsbd)\nI0318 17:46:42.538822 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602261953.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0318 17:47:13.109727 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-18T17:45:42Z","finishedAt":"2026-03-18T17:47:13Z","containerID":"cri-o://c2fb973641e8d289ba0dd09efd68e97b47576d6bc93a3c1a721a673bea80ce81"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","containerID":"cri-o://f73785a1635196cac38cc4bd53a22ffc286467a7b93071487c4e45283cb55722","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-l5tw2","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-64854d9cff-vpjmp.json0000640000000000000000000001403515156562566030511 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-64854d9cff-vpjmp","generateName":"csi-snapshot-controller-64854d9cff-","namespace":"openshift-cluster-storage-operator","uid":"7d39d93e-9be3-47e1-a44e-be2d18b55446","resourceVersion":"9128","creationTimestamp":"2026-03-18T17:41:54Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"64854d9cff"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.28/23\"],\"mac_address\":\"0a:58:0a:80:00:1c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.28/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.28\"\n ],\n \"mac\": \"0a:58:0a:80:00:1c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-64854d9cff","uid":"00e361c0-609d-4e26-9a68-256978aac35f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-vkcx9","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-vkcx9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000160000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c2"},"runAsNonRoot":true,"fsGroup":1000160000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:59Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.28","podIPs":[{"ip":"10.128.0.28"}],"startTime":"2026-03-18T17:41:54Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-03-18T17:47:24Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"I0318 17:45:42.446129 1 feature_gate.go:387] feature gates: {map[]}\nI0318 17:45:42.446319 1 main.go:169] Version: c5f5459160d28b87e4b27a6b760f152a172b8fc7\nI0318 17:45:42.447354 1 main.go:220] Start NewCSISnapshotController with kubeconfig [] resyncPeriod [15m0s]\nE0318 17:46:12.447855 1 main.go:104] Failed to list v1 volumesnapshotclasses with error=Get \"https://172.30.0.1:443/apis/snapshot.storage.k8s.io/v1/volumesnapshotclasses?limit=1\": context deadline exceeded\nE0318 17:46:12.447950 1 main.go:246] Exiting due to failure to ensure CRDs exist during startup: context deadline exceeded\n","startedAt":"2026-03-18T17:45:42Z","finishedAt":"2026-03-18T17:46:12Z","containerID":"cri-o://c9ad4dfdc283133c8325a6400b93e7ca1b286a38ba01514e1ca540aa2f6676d0"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","containerID":"cri-o://9da45c50b62258b35b6fa6e25a88e2e045b13f36511821a9d8c318812731dc4c","started":true,"volumeMounts":[{"name":"kube-api-access-vkcx9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-598fbc5f8f-7qwxn.json0000640000000000000000000002055715156562566032260 0ustar0000000000000000{"metadata":{"name":"cluster-node-tuning-operator-598fbc5f8f-7qwxn","generateName":"cluster-node-tuning-operator-598fbc5f8f-","namespace":"openshift-cluster-node-tuning-operator","uid":"7c6694a8-ccd0-491b-9f21-215450f6ce67","resourceVersion":"9562","creationTimestamp":"2026-03-18T17:40:19Z","labels":{"name":"cluster-node-tuning-operator","pod-template-hash":"598fbc5f8f"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-node-tuning-operator-598fbc5f8f","uid":"06842b34-7758-436b-863d-12c7f8e34c3c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"node-tuning-operator-tls","secret":{"secretName":"node-tuning-operator-tls","defaultMode":420}},{"name":"apiservice-cert","secret":{"secretName":"performance-addon-operator-webhook-cert","items":[{"key":"tls.crt","path":"apiserver.crt"},{"key":"tls.key","path":"apiserver.key"}],"defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"kube-api-access-mrdqg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-node-tuning-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","command":["cluster-node-tuning-operator"],"args":["-v=0"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"RESYNC_PERIOD","value":"600"},{"name":"CLUSTER_NODE_TUNED_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-mrdqg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"readOnlyRootFilesystem":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-node-tuning-operator","serviceAccount":"cluster-node-tuning-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c9"},"runAsUser":499,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:04Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:48:04Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:41:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2026-03-18T17:41:37Z","containerStatuses":[{"name":"cluster-node-tuning-operator","state":{"running":{"startedAt":"2026-03-18T17:48:03Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ler\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\"}\nI0318 17:42:29.411959 1 controller.go:1443] started events processor/controller\nI0318 17:42:29.454640 1 server.go:104] starting metrics server\nI0318 17:42:29.474031 1 controller.go:653] created profile master-0 [openshift-control-plane]\n{\"level\":\"info\",\"ts\":\"2026-03-18T17:42:29Z\",\"msg\":\"Starting workers\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\",\"worker count\":1}\nE0318 17:44:03.323980 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0318 17:45:03.326746 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io node-tuning-operator-lock)\nE0318 17:46:37.332231 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0318 17:47:29.319090 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-cluster-node-tuning-operator/leases/node-tuning-operator-lock\": context deadline exceeded\nI0318 17:47:29.319166 1 leaderelection.go:297] failed to renew lease openshift-cluster-node-tuning-operator/node-tuning-operator-lock: timed out waiting for the condition\nE0318 17:48:03.323892 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF0318 17:48:03.324015 1 main.go:242] manager exited with non-zero code: leader election lost\n","startedAt":"2026-03-18T17:42:29Z","finishedAt":"2026-03-18T17:48:03Z","containerID":"cri-o://6af98a7327b83a0f9fcfd3425055ee2bbebd96176bf419d80ea4f980729da819"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","containerID":"cri-o://54489b0edcfa24dfcbbb34581a482bdade21886266c2b553e30f0c64c39e011f","started":true,"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-mrdqg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-6864dc98f7-8vmsv.json0000640000000000000000000002535615156562566025753 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-6864dc98f7-8vmsv","generateName":"catalogd-controller-manager-6864dc98f7-","namespace":"openshift-catalogd","uid":"56cde2f7-1742-45d6-aa22-8270cfb424a7","resourceVersion":"9139","creationTimestamp":"2026-03-18T17:42:23Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"6864dc98f7"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.44/23\"],\"mac_address\":\"0a:58:0a:80:00:2c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.44/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.44\"\n ],\n \"mac\": \"0a:58:0a:80:00:2c\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-6864dc98f7","uid":"3b47cbef-0f6e-4ad0-80d5-5afa9a4f8e0d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-mbctm","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-mbctm","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-mbctm","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:47:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T17:42:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.44","podIPs":[{"ip":"10.128.0.44"}],"startTime":"2026-03-18T17:42:23Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-18T17:42:29Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://0a0369f8937b75b0cf3ec39fd7868190e5e65c0761eb215ce5daab985dbfd750","started":true,"volumeMounts":[{"name":"kube-api-access-mbctm","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-18T17:45:42Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"t-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"b8a5d57b-66c1-473c-8845-688a8c7e3819\"\nI0318 17:44:26.482057 1 controller.go:314] \"Warning: Reconciler returned both a non-zero result and a non-nil error. The result will always be ignored if the error is non-nil and the non-nil error causes reqeueuing with exponential backoff. For more details, see: https://pkg.go.dev/sigs.k8s.io/controller-runtime/pkg/reconcile#Reconciler\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"b8a5d57b-66c1-473c-8845-688a8c7e3819\"\nE0318 17:44:26.482075 1 controller.go:316] \"Reconciler error\" err=\"error updating status: Timeout: request did not complete within requested timeout - context deadline exceeded\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"b8a5d57b-66c1-473c-8845-688a8c7e3819\"\nI0318 17:44:26.482121 1 clustercatalog_controller.go:86] \"reconcile starting\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"0d4a14d2-53c5-4a37-80f3-c50d3e86783f\"\nE0318 17:44:30.279648 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0318 17:44:43.273426 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0318 17:44:43.273597 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-18T17:42:30Z","finishedAt":"2026-03-18T17:44:43Z","containerID":"cri-o://9a3c783faf4f4f653f053e2f216b7497912efa5f57b792ca0a2a383ce66b1a4d"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","containerID":"cri-o://c455513aeeb0a865514a01932b50b8b6b2a2bfaa8dc030657e848c60ae487c2b","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-mbctm","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215156562566020215 0ustar0000000000000000[]cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615156562566025521 0ustar0000000000000000{"metadata":{"name":"edit","uid":"6beefc53-ebe4-4979-ad5e-00afdc096a4d","resourceVersion":"7092","creationTimestamp":"2026-03-18T17:34:54Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315156562566025662 0ustar0000000000000000{"metadata":{"name":"admin","uid":"e2a00747-2628-4fdd-a822-6a48e5584924","resourceVersion":"7095","creationTimestamp":"2026-03-18T17:34:54Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115156562566027767 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"ca1cdf76-772f-4fb1-822c-e04eb65d8a1f","resourceVersion":"6121","generation":1,"creationTimestamp":"2026-03-18T17:42:12Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T17:42:13Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-18T17:42:13Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-18T17:42:13Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T17:42:13Z","reason":"AsExpected"}]}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115156562566025315 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"549ae528-b5f0-4045-a7e0-5dcf28036092","resourceVersion":"4963","generation":2,"creationTimestamp":"2026-03-18T17:36:45Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515156562566026754 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"6444d296-69b6-4b04-a5c6-cae91230bb70","resourceVersion":"7504","generation":1,"creationTimestamp":"2026-03-18T17:42:36Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715156562566024042 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"6914ec36-c37f-44b2-8b68-927639433b49","resourceVersion":"4962","generation":2,"creationTimestamp":"2026-03-18T17:40:45Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"aa4ad8ed-caeb-4cef-b354-4b21dddf95ab","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115156562566032125 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"620c9df2-1178-4283-9f33-65ab1825f486","resourceVersion":"7582","generation":2,"creationTimestamp":"2026-03-18T17:42:38Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}events/openshift-machine-api.json0000640000000000000000000000507515156562566015637 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T17:36:50Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-6f69995874-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T17:40:16Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-6f69995874-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T17:40:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T17:41:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T17:41:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T17:42:06Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T17:42:06Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T17:48:36Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-autoscaler-operator-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T17:48:36Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"control-plane-machine-set-operator-tls\" : secret \"control-plane-machine-set-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T17:48:36Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : secret \"machine-api-operator-tls\" not found","type":"Warning"}]}config/schedulers/cluster.json0000640000000000000000000000052415156562566015244 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"8806661b-e7c4-47a3-9b11-73d849f5a984","resourceVersion":"560","generation":1,"creationTimestamp":"2026-03-18T17:35:50Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/machineconfigpools/worker.json0000640000000000000000000000106615156562566016604 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-18T17:48:34Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10058","uid":"971148c6-9e50-42a0-a4cb-e06111095478"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117315156562566016565 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-18T17:48:34Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10055","uid":"3ef839fe-9b38-4092-b143-a3f5a661ace8"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615156562566027517 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"21eed0fa-9880-430f-aa50-16486006a338","resourceVersion":"6425","generation":2,"creationTimestamp":"2026-03-18T17:42:23Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/node/master-0.json0000640000000000000000000000544615156562566014007 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"6acd4a61-9d80-4f54-90a7-4ba0eb46353d","resourceVersion":"9154","creationTimestamp":"2026-03-18T17:40:17Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865360Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714384Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-18T17:47:46Z","lastTransitionTime":"2026-03-18T17:40:17Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-18T17:47:46Z","lastTransitionTime":"2026-03-18T17:40:17Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-18T17:47:46Z","lastTransitionTime":"2026-03-18T17:40:17Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-18T17:47:46Z","lastTransitionTime":"2026-03-18T17:41:37Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.113.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202603021444-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/proxy.json0000640000000000000000000000031315156562566012577 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"bef0ec2b-5fcd-4b28-8eaf-6f402cd91b59","resourceVersion":"554","generation":1,"creationTimestamp":"2026-03-18T17:35:49Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173515156562566025141 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"13609ce3-b786-4e3c-99be-334a2ffcee1a","resourceVersion":"9011","generation":1,"creationTimestamp":"2026-03-18T17:36:35Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-18T17:42:53Z","reason":"SufficientPods","message":""}]}}config/featuregate.json0000640000000000000000000000613615156562566013723 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"b5465960-c7bc-4f19-83e4-9b8d9fed584a","resourceVersion":"642","generation":1,"creationTimestamp":"2026-03-18T17:36:09Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.35","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/infrastructure.json0000640000000000000000000000106515156562566014503 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"da6ed08f-237e-4b8c-bc09-58ac86add96c","resourceVersion":"536","generation":1,"creationTimestamp":"2026-03-18T17:35:47Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/ingress.json0000640000000000000000000000043615156562566013076 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"15b820c6-e950-4a74-886d-aa2c5050e4e8","resourceVersion":"551","generation":1,"creationTimestamp":"2026-03-18T17:35:48Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/apiserver.json0000640000000000000000000000121615156562566013421 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"df974752-04f7-4258-a19a-beaaf62d64b5","resourceVersion":"800","generation":1,"creationTimestamp":"2026-03-18T17:36:17Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/image.json0000640000000000000000000000111715156562566012503 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"e39aa18b-6370-4873-a29c-2eb029744ffd","resourceVersion":"1354","generation":1,"creationTimestamp":"2026-03-18T17:36:30Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/network.json0000640000000000000000000000117015156562566013111 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d5269579-e8e3-476c-b93e-e056a2345d69","resourceVersion":"3331","generation":2,"creationTimestamp":"2026-03-18T17:35:49Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/oauth.json0000640000000000000000000000114415156562566012541 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"e79b62d5-9e93-4f33-bdf1-f9d56b183c88","resourceVersion":"1611","generation":1,"creationTimestamp":"2026-03-18T17:36:34Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/authentication.json0000640000000000000000000000116515156562566014443 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"12466820-294e-40eb-b935-9b9441e96454","resourceVersion":"1047","generation":1,"creationTimestamp":"2026-03-18T17:36:22Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"449a1268-19ea-4e4e-ad3c-01d5025f007d"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}