insights-operator/gathers.json0000640000000000000000000005357015156473536015302 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/image_pruners","duration_in_ms":7,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":44,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":80,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":210,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":592,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":45,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":84,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":29794,"records_count":160,"errors":["function \"support_secret\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"silenced_alerts\" failed with an error","function \"tsdb_status\" failed with an error","function \"active_alerts\" failed with an error","function \"metrics\" failed with an error","function \"machine_autoscalers\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-4q9tr.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-4tlnm.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-smghb.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-pzqqc.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-vj8tt.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-zz68c.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-4tlnm.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-4tlnm/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-4tlnm/etcd-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-g25jq.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-controller-manager/controller-manager-f8f5f6bc4-87dt7.json\""],"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":43,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":46,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":87,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":122,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11805,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":33,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":95,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5433,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":47,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":67,"records_count":5,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":11054,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":40,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":45,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":66,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":74,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":27,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":31,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":172,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":6,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":9,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":28,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":39,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":8,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":47,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":40,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":20,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":72,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":29760,"records_count":66,"errors":["the record with the same name \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-4q9tr.json\" was already recorded and had the fingerprint \"28b0d037d807b83e7ef45ea3dcb38ddc78dc8b248d6e20055e1e34e0a5d030e6\", overwriting with the record having fingerprint \"28b0d037d807b83e7ef45ea3dcb38ddc78dc8b248d6e20055e1e34e0a5d030e6\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-4tlnm.json\" was already recorded and had the fingerprint \"89cee803316487b5ef00f7dd5885eb07e5c52202ef5c79c7f438d1568595c225\", overwriting with the record having fingerprint \"89cee803316487b5ef00f7dd5885eb07e5c52202ef5c79c7f438d1568595c225\"","the record with the same name \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-smghb.json\" was already recorded and had the fingerprint \"06599af416effa372e34f610760db47f67bd1302d6f37bff528e327f914aa575\", overwriting with the record having fingerprint \"06599af416effa372e34f610760db47f67bd1302d6f37bff528e327f914aa575\"","the record with the same name \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-pzqqc.json\" was already recorded and had the fingerprint \"c2c8c6112d900d96eda6da362711c14f16808139686ba06c88dc472d4b8230c9\", overwriting with the record having fingerprint \"c2c8c6112d900d96eda6da362711c14f16808139686ba06c88dc472d4b8230c9\"","the record with the same name \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-vj8tt.json\" was already recorded and had the fingerprint \"b755414abd18ba11a08ada62a02c31f61f099ce5ac6041e287f4219d5abffe11\", overwriting with the record having fingerprint \"b755414abd18ba11a08ada62a02c31f61f099ce5ac6041e287f4219d5abffe11\"","the record with the same name \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-zz68c.json\" was already recorded and had the fingerprint \"14c3f1f0e585501196c3311c999c4b31c6b86d1af21e5e800aa64ec4699ba892\", overwriting with the record having fingerprint \"14c3f1f0e585501196c3311c999c4b31c6b86d1af21e5e800aa64ec4699ba892\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-4tlnm.json\" was already recorded and had the fingerprint \"89cee803316487b5ef00f7dd5885eb07e5c52202ef5c79c7f438d1568595c225\", overwriting with the record having fingerprint \"89cee803316487b5ef00f7dd5885eb07e5c52202ef5c79c7f438d1568595c225\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-4tlnm/etcd-operator_previous.log\" was already recorded and had the fingerprint \"a7c72b17cd4c6eb2ca56293461a7d1e9e7ec42d2f1315d5fc681272eed4d222e\", overwriting with the record having fingerprint \"a7c72b17cd4c6eb2ca56293461a7d1e9e7ec42d2f1315d5fc681272eed4d222e\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-4tlnm/etcd-operator_current.log\" was already recorded and had the fingerprint \"853406784abf9aa4551903b5f06ff959855ee2a5c5cf0931ab971ad08bfd14ee\", overwriting with the record having fingerprint \"853406784abf9aa4551903b5f06ff959855ee2a5c5cf0931ab971ad08bfd14ee\"","the record with the same name \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-g25jq.json\" was already recorded and had the fingerprint \"6cb03b9daa07088be0b3eba97fd237111ff07d8c30521b4e8f4d261097618467\", overwriting with the record having fingerprint \"6cb03b9daa07088be0b3eba97fd237111ff07d8c30521b4e8f4d261097618467\"","the record with the same name \"config/pod/openshift-controller-manager/controller-manager-f8f5f6bc4-87dt7.json\" was already recorded and had the fingerprint \"2671a5d17f33773eb7ec67ddc43320b3d0489bca6526c3512461a029c1c8e92c\", overwriting with the record having fingerprint \"2671a5d17f33773eb7ec67ddc43320b3d0489bca6526c3512461a029c1c8e92c\""],"warnings":["warning: the record with the same fingerprint \"28b0d037d807b83e7ef45ea3dcb38ddc78dc8b248d6e20055e1e34e0a5d030e6\" was already recorded at path \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-4q9tr.json\", recording another one with a different path \"config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-4q9tr.json\"","warning: the record with the same fingerprint \"89cee803316487b5ef00f7dd5885eb07e5c52202ef5c79c7f438d1568595c225\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-4tlnm.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-4tlnm.json\"","warning: the record with the same fingerprint \"06599af416effa372e34f610760db47f67bd1302d6f37bff528e327f914aa575\" was already recorded at path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-smghb.json\", recording another one with a different path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-smghb.json\"","warning: the record with the same fingerprint \"c2c8c6112d900d96eda6da362711c14f16808139686ba06c88dc472d4b8230c9\" was already recorded at path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-pzqqc.json\", recording another one with a different path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-pzqqc.json\"","warning: the record with the same fingerprint \"b755414abd18ba11a08ada62a02c31f61f099ce5ac6041e287f4219d5abffe11\" was already recorded at path \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-vj8tt.json\", recording another one with a different path \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-vj8tt.json\"","warning: the record with the same fingerprint \"14c3f1f0e585501196c3311c999c4b31c6b86d1af21e5e800aa64ec4699ba892\" was already recorded at path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-zz68c.json\", recording another one with a different path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-zz68c.json\"","warning: the record with the same fingerprint \"89cee803316487b5ef00f7dd5885eb07e5c52202ef5c79c7f438d1568595c225\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-4tlnm.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-4tlnm.json\"","warning: the record with the same fingerprint \"a7c72b17cd4c6eb2ca56293461a7d1e9e7ec42d2f1315d5fc681272eed4d222e\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-4tlnm/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-4tlnm/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"853406784abf9aa4551903b5f06ff959855ee2a5c5cf0931ab971ad08bfd14ee\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-4tlnm/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-4tlnm/etcd-operator_current.log\"","warning: the record with the same fingerprint \"6cb03b9daa07088be0b3eba97fd237111ff07d8c30521b4e8f4d261097618467\" was already recorded at path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-g25jq.json\", recording another one with a different path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-g25jq.json\"","warning: the record with the same fingerprint \"2671a5d17f33773eb7ec67ddc43320b3d0489bca6526c3512461a029c1c8e92c\" was already recorded at path \"config/pod/openshift-controller-manager/controller-manager-f8f5f6bc4-87dt7.json\", recording another one with a different path \"config/pod/openshift-controller-manager/controller-manager-f8f5f6bc4-87dt7.json\""],"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":11,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":34,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":37,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5433,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":2,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":6,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":110,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/operators","duration_in_ms":90,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":58,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":109,"records_count":17,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":18,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":80,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":228,"records_count":2,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":35.974,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515156473536020001 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515156473536021103 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005446515156473536014272 0ustar0000000000000000{"pods":78,"imageCount":64,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:86833de447f25d1d0fc15ed5460c5068cc48b18b78b8108304c5b5fd1dff04ab","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:31180c161c4416e7c7d06d63571b814732d4ff11a14e2bfdcac0681ed14204ac","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:1a25ef962e8f26b0d756aa0987d45d570c0afb2e2d2507cf2fee734792b95657","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"aC8iSHmKHojh","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","firstCommand":"WFJEBSInAJpw","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f2c59d19eb73ad5c0f93b0a63003c1885f5297959c9c45b401d1a74aea6e76","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"Kt0qS5G8piJp":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","firstCommand":"9RqZYN0XQJuD"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cdd28dfe7132e19af9f013f72cf120d970bc31b6b74693af262f8d2e82a096e1","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:de91abd5ad76fb491881a75a0feb4b8ca5600ceb5e15a4b0b687ada01ea0a44c","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9174864cd47431966d033d283bc7836e7ca579139ef85c36275db542fda80803","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:97c7a635130c574a2c501091bb44f17cd92e05e29b5102e59578b5885d9bfec0","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011045015156473531033640 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-7b64dcc66c-2vx582026-03-18T09:57:56.744582919Z I0318 09:57:56.741111 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T09:57:56.744582919Z I0318 09:57:56.741535 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T09:57:56.744582919Z I0318 09:57:56.741546 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:56.744582919Z I0318 09:57:56.741553 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:56.744582919Z I0318 09:57:56.741377 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T09:57:56.744582919Z I0318 09:57:56.741569 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T09:57:56.744582919Z I0318 09:57:56.741503 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:56.840641525Z I0318 09:57:56.840586 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T09:57:56.845401942Z I0318 09:57:56.845233 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:56.845692249Z I0318 09:57:56.845652 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:56.845692249Z I0318 09:57:56.845683 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:56.845905374Z I0318 09:57:56.845877 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T09:57:56.845942685Z I0318 09:57:56.845926 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:56.854723789Z E0318 09:57:56.854673 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.855011366Z E0318 09:57:56.854967 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.855011366Z E0318 09:57:56.855002 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.855335254Z E0318 09:57:56.855163 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.855335254Z E0318 09:57:56.855254 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.855427507Z E0318 09:57:56.855397 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.869673155Z E0318 09:57:56.867134 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.869673155Z E0318 09:57:56.867547 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.869673155Z E0318 09:57:56.867917 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.869673155Z E0318 09:57:56.867957 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.869673155Z E0318 09:57:56.868104 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.869673155Z E0318 09:57:56.868181 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.876835120Z E0318 09:57:56.876102 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.881325669Z E0318 09:57:56.881270 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.881599036Z E0318 09:57:56.881566 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.881599036Z E0318 09:57:56.881585 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.881764590Z E0318 09:57:56.881717 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.883512913Z E0318 09:57:56.882862 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.884640220Z E0318 09:57:56.884091 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.930651454Z E0318 09:57:56.930613 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.930727926Z E0318 09:57:56.930690 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.931048134Z E0318 09:57:56.930959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.931048134Z E0318 09:57:56.931023 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:56.931147726Z E0318 09:57:56.931130 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.015561049Z E0318 09:57:57.015326 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.015561049Z E0318 09:57:57.015354 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.015604780Z E0318 09:57:57.015570 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.015795024Z E0318 09:57:57.015767 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.016062351Z E0318 09:57:57.016033 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.183795179Z E0318 09:57:57.183744 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.183863080Z E0318 09:57:57.183791 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.183863080Z E0318 09:57:57.183815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.183863080Z E0318 09:57:57.183816 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.183903791Z E0318 09:57:57.183876 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.510783857Z E0318 09:57:57.510744 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.511172206Z E0318 09:57:57.511153 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.511258998Z E0318 09:57:57.511237 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.511404402Z E0318 09:57:57.511186 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:57.511488304Z E0318 09:57:57.511474 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:58.159980297Z E0318 09:57:58.157995 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:58.159980297Z E0318 09:57:58.158006 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:58.159980297Z E0318 09:57:58.159708 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:58.159980297Z E0318 09:57:58.159745 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:58.159980297Z E0318 09:57:58.159914 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:59.448580326Z E0318 09:57:59.446352 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:59.448580326Z E0318 09:57:59.446427 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:59.451517458Z E0318 09:57:59.451483 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:59.451978529Z E0318 09:57:59.451951 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:57:59.452060771Z E0318 09:57:59.451956 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:02.015278550Z E0318 09:58:02.015143 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:02.015278550Z E0318 09:58:02.015177 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:02.015278550Z E0318 09:58:02.015143 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:02.015361982Z E0318 09:58:02.015335 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:02.018448728Z E0318 09:58:02.018353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:07.147114078Z E0318 09:58:07.147008 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:07.147194440Z E0318 09:58:07.147163 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:07.148065972Z E0318 09:58:07.147522 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:07.148065972Z E0318 09:58:07.147593 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:07.148756539Z E0318 09:58:07.148698 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:11.473397188Z time="2026-03-18T09:58:11Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T09:58:11.555927414Z time="2026-03-18T09:58:11Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T09:58:14.592666780Z E0318 09:58:14.592564 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:14.596089074Z E0318 09:58:14.596058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:15.189653634Z E0318 09:58:15.189614 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:15.190293160Z E0318 09:58:15.189899 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:15.190433514Z E0318 09:58:15.189980 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:15.190583357Z E0318 09:58:15.190016 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:15.190683800Z E0318 09:58:15.190050 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:17.395083962Z E0318 09:58:17.395001 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:17.395083962Z E0318 09:58:17.395048 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:17.395125223Z E0318 09:58:17.395085 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:17.395296937Z E0318 09:58:17.395260 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:17.395296937Z E0318 09:58:17.395286 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:38.096568570Z time="2026-03-18T09:58:38Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-18T09:58:38.096568570Z time="2026-03-18T09:58:38Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T09:58:45.236664330Z E0318 09:58:45.235540 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.236664330Z E0318 09:58:45.236151 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.236664330Z E0318 09:58:45.236438 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.237039659Z E0318 09:58:45.236734 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.240937674Z E0318 09:58:45.238354 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.616529570Z time="2026-03-18T09:58:45Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-18T09:58:45.621287116Z time="2026-03-18T09:58:45Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T09:58:47.399719822Z E0318 09:58:47.399397 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:47.399885576Z E0318 09:58:47.399871 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:47.400034670Z E0318 09:58:47.400016 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:47.400157683Z E0318 09:58:47.400140 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:47.400281396Z E0318 09:58:47.400268 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" package-server-manager_current.log0000640000000000000000000005201315156473531036765 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-r8fkv2026-03-18T09:56:50.132013449Z 2026-03-18T09:56:50Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:50.132086401Z 2026-03-18T09:56:50Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:56:50.153614313Z 2026-03-18T09:56:50Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:56:50.153614313Z 2026-03-18T09:56:50Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:50.153773737Z 2026-03-18T09:56:50Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:56:50.153773737Z 2026-03-18T09:56:50Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:50.153923101Z 2026-03-18T09:56:50Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:50.157151551Z 2026-03-18T09:56:50Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:56:50.189913131Z 2026-03-18T09:56:50Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:56:50.190021734Z 2026-03-18T09:56:50Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:51.496278756Z 2026-03-18T09:56:51Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:56:51.496278756Z 2026-03-18T09:56:51Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:51.496393979Z 2026-03-18T09:56:51Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:51.496456151Z 2026-03-18T09:56:51Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:56:51.520326771Z 2026-03-18T09:56:51Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:56:51.520326771Z 2026-03-18T09:56:51Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:52.247187452Z 2026-03-18T09:56:52Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:56:52.247187452Z 2026-03-18T09:56:52Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:52.247652653Z 2026-03-18T09:56:52Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:52.253767324Z 2026-03-18T09:56:52Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:56:52.276023035Z 2026-03-18T09:56:52Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:56:52.276023035Z 2026-03-18T09:56:52Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:53.040354822Z 2026-03-18T09:56:53Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:56:53.040354822Z 2026-03-18T09:56:53Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:53.040354822Z 2026-03-18T09:56:53Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:53.040354822Z 2026-03-18T09:56:53Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:56:53.066268803Z 2026-03-18T09:56:53Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:56:53.066268803Z 2026-03-18T09:56:53Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:54.132847268Z 2026-03-18T09:56:54Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:56:54.132847268Z 2026-03-18T09:56:54Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:54.132961191Z 2026-03-18T09:56:54Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:54.133014462Z 2026-03-18T09:56:54Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:56:54.157739373Z 2026-03-18T09:56:54Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:56:54.158508913Z 2026-03-18T09:56:54Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:55.552709461Z 2026-03-18T09:56:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:56:55.552709461Z 2026-03-18T09:56:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:55.552755182Z 2026-03-18T09:56:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:55.552808823Z 2026-03-18T09:56:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:56:55.578927869Z 2026-03-18T09:56:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:56:55.578927869Z 2026-03-18T09:56:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:56.310251701Z 2026-03-18T09:56:56Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:56:56.310251701Z 2026-03-18T09:56:56Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:56.310251701Z 2026-03-18T09:56:56Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:56.310251701Z 2026-03-18T09:56:56Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:56:56.381875372Z 2026-03-18T09:56:56Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:56:56.381875372Z 2026-03-18T09:56:56Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:57.043260853Z 2026-03-18T09:56:57Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:56:57.043260853Z 2026-03-18T09:56:57Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:57.043352646Z 2026-03-18T09:56:57Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:57.043364966Z 2026-03-18T09:56:57Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:56:57.056965402Z 2026-03-18T09:56:57Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:56:57.056965402Z 2026-03-18T09:56:57Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:58.263304254Z 2026-03-18T09:56:58Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:56:58.263304254Z 2026-03-18T09:56:58Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:58.263503099Z 2026-03-18T09:56:58Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:58.263553040Z 2026-03-18T09:56:58Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:56:58.288993480Z 2026-03-18T09:56:58Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:56:58.288993480Z 2026-03-18T09:56:58Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:59.637243851Z 2026-03-18T09:56:59Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:56:59.637916928Z 2026-03-18T09:56:59Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:59.638368539Z 2026-03-18T09:56:59Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:56:59.638459231Z 2026-03-18T09:56:59Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:56:59.660568968Z 2026-03-18T09:56:59Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:56:59.660568968Z 2026-03-18T09:56:59Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:00.207142129Z 2026-03-18T09:57:00Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:57:00.207142129Z 2026-03-18T09:57:00Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:00.207188160Z 2026-03-18T09:57:00Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:00.207275012Z 2026-03-18T09:57:00Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:57:00.218812757Z 2026-03-18T09:57:00Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:57:00.218812757Z 2026-03-18T09:57:00Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:33.789744782Z 2026-03-18T09:57:33Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:57:33.789744782Z 2026-03-18T09:57:33Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:33.789744782Z 2026-03-18T09:57:33Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:33.794610171Z 2026-03-18T09:57:33Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:57:33.817330476Z 2026-03-18T09:57:33Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:57:33.817330476Z 2026-03-18T09:57:33Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:33.817330476Z 2026-03-18T09:57:33Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:57:33.817330476Z 2026-03-18T09:57:33Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:33.820536824Z 2026-03-18T09:57:33Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:33.820536824Z 2026-03-18T09:57:33Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:57:33.833935642Z 2026-03-18T09:57:33Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:57:33.833935642Z 2026-03-18T09:57:33Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:33.930073340Z 2026-03-18T09:57:33Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:57:33.930073340Z 2026-03-18T09:57:33Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:33.930073340Z 2026-03-18T09:57:33Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:33.930073340Z 2026-03-18T09:57:33Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:57:33.971860311Z 2026-03-18T09:57:33Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:57:33.971860311Z 2026-03-18T09:57:33Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:34.125432733Z 2026-03-18T09:57:34Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:57:34.125432733Z 2026-03-18T09:57:34Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:34.125480104Z 2026-03-18T09:57:34Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:34.125510815Z 2026-03-18T09:57:34Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:57:34.151497210Z 2026-03-18T09:57:34Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:57:34.151497210Z 2026-03-18T09:57:34Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:34.246731516Z 2026-03-18T09:57:34Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T09:57:34.246731516Z 2026-03-18T09:57:34Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:34.246837799Z 2026-03-18T09:57:34Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T09:57:34.246854469Z 2026-03-18T09:57:34Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T09:57:34.261232400Z 2026-03-18T09:57:34Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T09:57:34.261232400Z 2026-03-18T09:57:34Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415156473531035470 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-r8fkv2026-03-18T09:55:17.782947941Z W0318 09:55:17.779910 1 deprecated.go:66] 2026-03-18T09:55:17.782947941Z ==== Removed Flag Warning ====================== 2026-03-18T09:55:17.782947941Z 2026-03-18T09:55:17.782947941Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-18T09:55:17.782947941Z 2026-03-18T09:55:17.782947941Z =============================================== 2026-03-18T09:55:17.782947941Z 2026-03-18T09:55:17.782947941Z I0318 09:55:17.780498 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-18T09:55:17.782947941Z I0318 09:55:17.782188 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-18T09:55:17.783129605Z I0318 09:55:17.783106 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-18T09:55:17.783509624Z I0318 09:55:17.783496 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415156473531032740 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-5c9796789-hc74k2026-03-18T09:58:25.496157058Z time="2026-03-18T09:58:25Z" level=info msg="install strategy successful" csv=packageserver id=d4UIs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:25.598279093Z time="2026-03-18T09:58:25Z" level=info msg="install strategy successful" csv=packageserver id=N9Yc/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:25.694864572Z time="2026-03-18T09:58:25Z" level=info msg="install strategy successful" csv=packageserver id=uqvsq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:25.795862050Z time="2026-03-18T09:58:25Z" level=info msg="install strategy successful" csv=packageserver id=Vry/M namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:25.895523614Z time="2026-03-18T09:58:25Z" level=info msg="install strategy successful" csv=packageserver id=ARpaM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:25.999436313Z time="2026-03-18T09:58:25Z" level=info msg="install strategy successful" csv=packageserver id=keLOI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:26.097297634Z time="2026-03-18T09:58:26Z" level=info msg="install strategy successful" csv=packageserver id=Vrk8H namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:26.208160962Z time="2026-03-18T09:58:26Z" level=info msg="install strategy successful" csv=packageserver id=hw04E namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:26.299241537Z time="2026-03-18T09:58:26Z" level=info msg="install strategy successful" csv=packageserver id=pTjww namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:26.399113407Z time="2026-03-18T09:58:26Z" level=info msg="install strategy successful" csv=packageserver id=tli3d namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:26.500239377Z time="2026-03-18T09:58:26Z" level=info msg="install strategy successful" csv=packageserver id=uecCy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:26.593327462Z time="2026-03-18T09:58:26Z" level=info msg="install strategy successful" csv=packageserver id=JMB9c namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:26.736013627Z time="2026-03-18T09:58:26Z" level=info msg="install strategy successful" csv=packageserver id=olQUG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:26.836291487Z time="2026-03-18T09:58:26Z" level=info msg="install strategy successful" csv=packageserver id=GktTq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:26.892587202Z time="2026-03-18T09:58:26Z" level=info msg="install strategy successful" csv=packageserver id=k6YH3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:27.013989718Z time="2026-03-18T09:58:27Z" level=info msg="install strategy successful" csv=packageserver id=Bl344 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:27.114243787Z time="2026-03-18T09:58:27Z" level=info msg="install strategy successful" csv=packageserver id=IQMTf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:27.214387354Z time="2026-03-18T09:58:27Z" level=info msg="install strategy successful" csv=packageserver id=k0GP3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:27.293192399Z time="2026-03-18T09:58:27Z" level=info msg="install strategy successful" csv=packageserver id=YBCU2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:27.395883548Z time="2026-03-18T09:58:27Z" level=info msg="install strategy successful" csv=packageserver id=ITmO0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:27.494311682Z time="2026-03-18T09:58:27Z" level=info msg="install strategy successful" csv=packageserver id=ybZn6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:27.592327587Z time="2026-03-18T09:58:27Z" level=info msg="install strategy successful" csv=packageserver id=hZR99 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:27.693988461Z time="2026-03-18T09:58:27Z" level=info msg="install strategy successful" csv=packageserver id=pmBMi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:27.796177607Z time="2026-03-18T09:58:27Z" level=info msg="install strategy successful" csv=packageserver id=orESj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:27.897232126Z time="2026-03-18T09:58:27Z" level=info msg="install strategy successful" csv=packageserver id=4mDni namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:27.997123966Z time="2026-03-18T09:58:27Z" level=info msg="install strategy successful" csv=packageserver id=HSVSe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:28.102862938Z time="2026-03-18T09:58:28Z" level=info msg="install strategy successful" csv=packageserver id=DMCdX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:28.204943122Z time="2026-03-18T09:58:28Z" level=info msg="install strategy successful" csv=packageserver id=wZ2uJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:28.298518238Z time="2026-03-18T09:58:28Z" level=info msg="install strategy successful" csv=packageserver id=Akjqt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:28.402407266Z time="2026-03-18T09:58:28Z" level=info msg="install strategy successful" csv=packageserver id=dVDVq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:28.498789101Z time="2026-03-18T09:58:28Z" level=info msg="install strategy successful" csv=packageserver id=sk0Jh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:28.608238365Z time="2026-03-18T09:58:28Z" level=info msg="install strategy successful" csv=packageserver id=XXz4i namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.079398995Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=kVLNw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.176894787Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=SLjgR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.324369600Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=MInU0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.364890920Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=xGVwN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.416277705Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=XxTfI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.517501268Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=LvQi1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.524337325Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=aQ/HX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.531484879Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=zI16M namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.538594053Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=6dy5P namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.593193477Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=BFP68 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.693971019Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=6MDO4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.794301860Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=X6aGp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.893890563Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=FY8Rs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:29.992279106Z time="2026-03-18T09:58:29Z" level=info msg="install strategy successful" csv=packageserver id=y+ire namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:30.093815647Z time="2026-03-18T09:58:30Z" level=info msg="install strategy successful" csv=packageserver id=9rhCI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:30.218087803Z time="2026-03-18T09:58:30Z" level=info msg="install strategy successful" csv=packageserver id=Tqizb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:30.416859699Z time="2026-03-18T09:58:30Z" level=info msg="install strategy successful" csv=packageserver id=7mDWc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:30.503988687Z time="2026-03-18T09:58:30Z" level=info msg="install strategy successful" csv=packageserver id=+tCu0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:30.549578771Z time="2026-03-18T09:58:30Z" level=info msg="install strategy successful" csv=packageserver id=c0/pV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:30.636188047Z time="2026-03-18T09:58:30Z" level=info msg="install strategy successful" csv=packageserver id=CQYSN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:30.694862680Z time="2026-03-18T09:58:30Z" level=info msg="install strategy successful" csv=packageserver id=5JuSm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:30.808465666Z time="2026-03-18T09:58:30Z" level=info msg="install strategy successful" csv=packageserver id=DoSvn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:30.943617848Z time="2026-03-18T09:58:30Z" level=info msg="install strategy successful" csv=packageserver id=4JrHy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:30.993541337Z time="2026-03-18T09:58:30Z" level=info msg="install strategy successful" csv=packageserver id=Wpd5H namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:31.093634412Z time="2026-03-18T09:58:31Z" level=info msg="install strategy successful" csv=packageserver id=dSNoc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:31.193403390Z time="2026-03-18T09:58:31Z" level=info msg="install strategy successful" csv=packageserver id=o5XFe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:31.806222850Z time="2026-03-18T09:58:31Z" level=info msg="install strategy successful" csv=packageserver id=mz1I6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:32.441960651Z time="2026-03-18T09:58:32Z" level=info msg="install strategy successful" csv=packageserver id=I3aG5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:33.893117702Z time="2026-03-18T09:58:33Z" level=info msg="install strategy successful" csv=packageserver id=hPbLM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:36.364019405Z time="2026-03-18T09:58:36Z" level=info msg="install strategy successful" csv=packageserver id=4b+p7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:44.451237502Z time="2026-03-18T09:58:44Z" level=info msg="install strategy successful" csv=packageserver id=c+eQU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:45.591001446Z time="2026-03-18T09:58:45Z" level=info msg="install strategy successful" csv=packageserver id=7u2JT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:45.713088039Z time="2026-03-18T09:58:45Z" level=info msg="install strategy successful" csv=packageserver id=TBjfK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:45.817022808Z time="2026-03-18T09:58:45Z" level=info msg="install strategy successful" csv=packageserver id=kOTje namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:45.911644599Z time="2026-03-18T09:58:45Z" level=info msg="install strategy successful" csv=packageserver id=pTDUM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:45.922566276Z time="2026-03-18T09:58:45Z" level=info msg="install strategy successful" csv=packageserver id=Hkplk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:45.931422713Z time="2026-03-18T09:58:45Z" level=info msg="install strategy successful" csv=packageserver id=AaZL7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.012208025Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=Yzq+b namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.022901226Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=xnpCr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.033845274Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=rCpxx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.043702785Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=3JPpO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.059738816Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=tiT5a namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.075283976Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=+x7iW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.145581693Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=acbts namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.221482638Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=r+TSZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.233916811Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=MfMDm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.241724232Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=9UGQq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.327280512Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=7IU+1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.337033691Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=M3cbB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.344978295Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=on/oP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.365862475Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=ZWs83 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.373862470Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=iIYel namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.379950429Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=DMrxY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.384869519Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=YPFNd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.487879726Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=MG8J9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.587834188Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=3ODOH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.700632743Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=Jw5Pw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.786550242Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=66Evi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.887148350Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=alHi4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:46.988994988Z time="2026-03-18T09:58:46Z" level=info msg="install strategy successful" csv=packageserver id=w4uxx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:47.087569346Z time="2026-03-18T09:58:47Z" level=info msg="install strategy successful" csv=packageserver id=OhI34 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:47.186906743Z time="2026-03-18T09:58:47Z" level=info msg="install strategy successful" csv=packageserver id=6N2vL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:47.290868893Z time="2026-03-18T09:58:47Z" level=info msg="install strategy successful" csv=packageserver id=gKvY4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:47.386789776Z time="2026-03-18T09:58:47Z" level=info msg="install strategy successful" csv=packageserver id=Qz1no namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:47.485846416Z time="2026-03-18T09:58:47Z" level=info msg="install strategy successful" csv=packageserver id=grqnN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:47.584909856Z time="2026-03-18T09:58:47Z" level=info msg="install strategy successful" csv=packageserver id=QEEzh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:47.686393895Z time="2026-03-18T09:58:47Z" level=info msg="install strategy successful" csv=packageserver id=27dKR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T09:58:47.787418773Z time="2026-03-18T09:58:47Z" level=info msg="install strategy successful" csv=packageserver id=bRiCo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000005637415156473531035013 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-68f85b4d6c-fhz5s2026-03-18T09:58:11.559350838Z time="2026-03-18T09:58:11Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nzqck current-pod.namespace=openshift-marketplace id=ZOZUI 2026-03-18T09:58:11.559350838Z time="2026-03-18T09:58:11Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=ZOZUI 2026-03-18T09:58:11.559350838Z time="2026-03-18T09:58:11Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ZOZUI 2026-03-18T09:58:11.559350838Z time="2026-03-18T09:58:11Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ZOZUI 2026-03-18T09:58:11.563010157Z time="2026-03-18T09:58:11Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9u+2D 2026-03-18T09:58:11.563123070Z time="2026-03-18T09:58:11Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-pdfn6 current-pod.namespace=openshift-marketplace id=9u+2D 2026-03-18T09:58:11.563123070Z time="2026-03-18T09:58:11Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-pdfn6 current-pod.namespace=openshift-marketplace id=9u+2D 2026-03-18T09:58:11.566858121Z time="2026-03-18T09:58:11Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9u+2D 2026-03-18T09:58:11.566858121Z time="2026-03-18T09:58:11Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=9u+2D 2026-03-18T09:58:12.077786673Z time="2026-03-18T09:58:12Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ZOZUI 2026-03-18T09:58:12.079163047Z time="2026-03-18T09:58:12Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nzqck current-pod.namespace=openshift-marketplace id=ZOZUI 2026-03-18T09:58:12.079163047Z time="2026-03-18T09:58:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nzqck current-pod.namespace=openshift-marketplace id=ZOZUI 2026-03-18T09:58:12.079163047Z time="2026-03-18T09:58:12Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ZOZUI 2026-03-18T09:58:12.079163047Z time="2026-03-18T09:58:12Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=ZOZUI 2026-03-18T09:58:34.598281459Z time="2026-03-18T09:58:34Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=redhat-operators state.State=READY" 2026-03-18T09:58:34.598335791Z time="2026-03-18T09:58:34Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:34.598335791Z time="2026-03-18T09:58:34Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:34.598335791Z time="2026-03-18T09:58:34Z" level=info msg="resolving sources" id=MW35d namespace=openshift-marketplace 2026-03-18T09:58:34.598346801Z time="2026-03-18T09:58:34Z" level=info msg="checking if subscriptions need update" id=MW35d namespace=openshift-marketplace 2026-03-18T09:58:36.066654180Z time="2026-03-18T09:58:36Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=redhat-marketplace state.State=READY" 2026-03-18T09:58:36.066654180Z time="2026-03-18T09:58:36Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.066701392Z time="2026-03-18T09:58:36Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.104485264Z time="2026-03-18T09:58:36Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=MW35d namespace=openshift-marketplace 2026-03-18T09:58:36.104567446Z time="2026-03-18T09:58:36Z" level=info msg="resolving sources" id=MoGn/ namespace=openshift-marketplace 2026-03-18T09:58:36.104596267Z time="2026-03-18T09:58:36Z" level=info msg="checking if subscriptions need update" id=MoGn/ namespace=openshift-marketplace 2026-03-18T09:58:36.299236382Z time="2026-03-18T09:58:36Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.299500499Z time="2026-03-18T09:58:36Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.299601891Z time="2026-03-18T09:58:36Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.299664443Z time="2026-03-18T09:58:36Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=cCDNh 2026-03-18T09:58:36.299712984Z time="2026-03-18T09:58:36Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.299760675Z time="2026-03-18T09:58:36Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.300231866Z time="2026-03-18T09:58:36Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=MoGn/ namespace=openshift-marketplace 2026-03-18T09:58:36.300318069Z time="2026-03-18T09:58:36Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:36.300572395Z time="2026-03-18T09:58:36Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:36.300686208Z time="2026-03-18T09:58:36Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:36.300769230Z time="2026-03-18T09:58:36Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=I2dy0 2026-03-18T09:58:36.300821031Z time="2026-03-18T09:58:36Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:36.300971255Z time="2026-03-18T09:58:36Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:36.812524212Z time="2026-03-18T09:58:36Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.813772292Z time="2026-03-18T09:58:36Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.814160592Z time="2026-03-18T09:58:36Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:36.814201223Z time="2026-03-18T09:58:36Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.814262464Z time="2026-03-18T09:58:36Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:36.814262464Z time="2026-03-18T09:58:36Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:36.814340026Z time="2026-03-18T09:58:36Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.814366807Z time="2026-03-18T09:58:36Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=cCDNh 2026-03-18T09:58:36.814629163Z time="2026-03-18T09:58:36Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:36.814664974Z time="2026-03-18T09:58:36Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=I2dy0 2026-03-18T09:58:38.092872910Z time="2026-03-18T09:58:38Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:38.092872910Z time="2026-03-18T09:58:38Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:38.092872910Z time="2026-03-18T09:58:38Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:38.092872910Z time="2026-03-18T09:58:38Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:45.578451000Z time="2026-03-18T09:58:45Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:45.578522611Z time="2026-03-18T09:58:45Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:45.578568572Z time="2026-03-18T09:58:45Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:45.578587873Z time="2026-03-18T09:58:45Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:45.578595123Z time="2026-03-18T09:58:45Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=kZW7F 2026-03-18T09:58:45.578602293Z time="2026-03-18T09:58:45Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:45.578609443Z time="2026-03-18T09:58:45Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:45.578617704Z time="2026-03-18T09:58:45Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:45.578626034Z time="2026-03-18T09:58:45Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:45.578646084Z time="2026-03-18T09:58:45Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=ydVW1 2026-03-18T09:58:45.578646084Z time="2026-03-18T09:58:45Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:45.578653754Z time="2026-03-18T09:58:45Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:45.603010179Z time="2026-03-18T09:58:45Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:45.603136753Z time="2026-03-18T09:58:45Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:45.603287546Z time="2026-03-18T09:58:45Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:45.603295536Z time="2026-03-18T09:58:45Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:45.603402699Z time="2026-03-18T09:58:45Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:45.603402699Z time="2026-03-18T09:58:45Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=kZW7F 2026-03-18T09:58:45.603750938Z time="2026-03-18T09:58:45Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:45.603750938Z time="2026-03-18T09:58:45Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:45.603983053Z time="2026-03-18T09:58:45Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:45.604848104Z time="2026-03-18T09:58:45Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ydVW1 2026-03-18T09:58:45.617370480Z time="2026-03-18T09:58:45Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:45.617370480Z time="2026-03-18T09:58:45Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:45.621889911Z time="2026-03-18T09:58:45Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Jv41z 2026-03-18T09:58:45.621962002Z time="2026-03-18T09:58:45Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Jv41z 2026-03-18T09:58:45.629641980Z time="2026-03-18T09:58:45Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:45.629961388Z time="2026-03-18T09:58:45Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:45.630317467Z time="2026-03-18T09:58:45Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:45.630621364Z time="2026-03-18T09:58:45Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=qiwzt 2026-03-18T09:58:45.630648805Z time="2026-03-18T09:58:45Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:45.630671585Z time="2026-03-18T09:58:45Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:45.630750157Z time="2026-03-18T09:58:45Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Jv41z 2026-03-18T09:58:45.630845970Z time="2026-03-18T09:58:45Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=Jv41z 2026-03-18T09:58:45.630877250Z time="2026-03-18T09:58:45Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=Jv41z 2026-03-18T09:58:45.630904001Z time="2026-03-18T09:58:45Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=Jv41z 2026-03-18T09:58:45.631092516Z time="2026-03-18T09:58:45Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Jv41z 2026-03-18T09:58:45.631120216Z time="2026-03-18T09:58:45Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Jv41z 2026-03-18T09:58:46.581290728Z time="2026-03-18T09:58:46Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:46.581495423Z time="2026-03-18T09:58:46Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:46.581570505Z time="2026-03-18T09:58:46Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-8w5rc current-pod.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:46.581679137Z time="2026-03-18T09:58:46Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:46.581705828Z time="2026-03-18T09:58:46Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=qiwzt 2026-03-18T09:58:46.781891518Z time="2026-03-18T09:58:46Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Jv41z 2026-03-18T09:58:46.782085583Z time="2026-03-18T09:58:46Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=Jv41z 2026-03-18T09:58:46.782127404Z time="2026-03-18T09:58:46Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-jl7c8 current-pod.namespace=openshift-marketplace id=Jv41z 2026-03-18T09:58:46.782221186Z time="2026-03-18T09:58:46Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Jv41z 2026-03-18T09:58:46.782246817Z time="2026-03-18T09:58:46Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Jv41z route-controller-manager_current.log0000640000000000000000000004207715156473531037723 0ustar0000000000000000config/pod/openshift-route-controller-manager/logs/route-controller-manager-54cf6885f8-xsgcr2026-03-18T09:55:39.095104945Z I0318 09:55:39.094929 1 cmd.go:240] Using service-serving-cert provided certificates 2026-03-18T09:55:39.095104945Z I0318 09:55:39.095066 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:55:39.095531715Z I0318 09:55:39.095483 1 observer_polling.go:159] Starting file observer 2026-03-18T09:55:39.095954665Z I0318 09:55:39.095918 1 builder.go:298] route-controller-manager version 4.18.0-202602261953.p2.gce6ffa2.assembly.stream.el9-ce6ffa2-ce6ffa24dac3a5f49f70818e1159e40eaf27a6a3 2026-03-18T09:55:39.096608511Z I0318 09:55:39.096575 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T09:55:40.143139185Z I0318 09:55:40.143057 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-18T09:55:40.632485847Z I0318 09:55:40.631465 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-18T09:55:40.632485847Z I0318 09:55:40.631495 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-18T09:55:40.632485847Z I0318 09:55:40.631527 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-18T09:55:40.632485847Z I0318 09:55:40.631537 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-18T09:55:40.637536418Z I0318 09:55:40.637499 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T09:55:40.637608490Z W0318 09:55:40.637581 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:55:40.637636820Z W0318 09:55:40.637626 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:55:40.637662801Z W0318 09:55:40.637653 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T09:55:40.637688082Z W0318 09:55:40.637678 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T09:55:40.637713992Z W0318 09:55:40.637704 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T09:55:40.637739023Z W0318 09:55:40.637729 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T09:55:40.638043670Z I0318 09:55:40.638026 1 genericapiserver.go:514] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-18T09:55:40.665549912Z I0318 09:55:40.665492 1 dynamic_serving_content.go:132] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T09:55:40.666728600Z I0318 09:55:40.665659 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController 2026-03-18T09:55:40.666728600Z I0318 09:55:40.665679 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T09:55:40.666728600Z I0318 09:55:40.665711 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T09:55:40.666728600Z I0318 09:55:40.665723 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:55:40.666728600Z I0318 09:55:40.665744 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T09:55:40.666728600Z I0318 09:55:40.665751 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:55:40.668489143Z I0318 09:55:40.668239 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T09:55:40.668788920Z I0318 09:55:40.668754 1 leaderelection.go:250] attempting to acquire leader lease openshift-route-controller-manager/openshift-route-controllers... 2026-03-18T09:55:40.674942568Z I0318 09:55:40.674005 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773827683\" (2026-03-18 09:55:02 +0000 UTC to 2028-03-17 09:55:03 +0000 UTC (now=2026-03-18 09:55:40.673942224 +0000 UTC))" 2026-03-18T09:55:40.674942568Z I0318 09:55:40.674258 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827739\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827739\" (2026-03-18 08:55:39 +0000 UTC to 2027-03-18 08:55:39 +0000 UTC (now=2026-03-18 09:55:40.674228731 +0000 UTC))" 2026-03-18T09:55:40.674942568Z I0318 09:55:40.674293 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T09:55:40.674942568Z I0318 09:55:40.674325 1 genericapiserver.go:662] [graceful-termination] waiting for shutdown to be initiated 2026-03-18T09:55:40.674942568Z I0318 09:55:40.674349 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" 2026-03-18T09:55:40.680619594Z I0318 09:55:40.680566 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T09:55:40.683911994Z I0318 09:55:40.681116 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T09:55:40.683911994Z I0318 09:55:40.682113 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T09:55:40.701226180Z I0318 09:55:40.701173 1 leaderelection.go:260] successfully acquired lease openshift-route-controller-manager/openshift-route-controllers 2026-03-18T09:55:40.702488851Z I0318 09:55:40.702389 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-route-controller-manager", Name:"openshift-route-controllers", UID:"66e95d7f-a243-4d2e-a425-3adb49ac68ab", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"7418", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' route-controller-manager-54cf6885f8-xsgcr_4b31c2e9-00f6-43d8-b89c-1316306a5b30 became leader 2026-03-18T09:55:40.702597893Z I0318 09:55:40.702581 1 controller_manager.go:36] Starting "openshift.io/ingress-ip" 2026-03-18T09:55:40.702627934Z I0318 09:55:40.702617 1 controller_manager.go:46] Started "openshift.io/ingress-ip" 2026-03-18T09:55:40.702654455Z I0318 09:55:40.702644 1 controller_manager.go:36] Starting "openshift.io/ingress-to-route" 2026-03-18T09:55:40.723634129Z I0318 09:55:40.723575 1 ingress.go:262] ingress-to-route metrics registered with prometheus 2026-03-18T09:55:40.723634129Z I0318 09:55:40.723595 1 controller_manager.go:46] Started "openshift.io/ingress-to-route" 2026-03-18T09:55:40.723634129Z I0318 09:55:40.723602 1 controller_manager.go:48] Started Route Controllers 2026-03-18T09:55:40.724401508Z I0318 09:55:40.724376 1 ingress.go:313] Starting controller 2026-03-18T09:55:40.725703529Z W0318 09:55:40.725666 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:55:40.725726340Z E0318 09:55:40.725692 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:55:40.729452989Z I0318 09:55:40.729395 1 reflector.go:359] Caches populated for *v1.Ingress from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T09:55:40.729800448Z I0318 09:55:40.729764 1 reflector.go:359] Caches populated for *v1.IngressClass from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T09:55:40.736448667Z I0318 09:55:40.736393 1 reflector.go:359] Caches populated for *v1.Service from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T09:55:40.765906956Z I0318 09:55:40.765754 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T09:55:40.765906956Z I0318 09:55:40.765815 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:55:40.765934987Z I0318 09:55:40.765915 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:55:40.767730400Z I0318 09:55:40.766190 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 09:36:55 +0000 UTC to 2036-03-15 09:36:55 +0000 UTC (now=2026-03-18 09:55:40.766160702 +0000 UTC))" 2026-03-18T09:55:40.767730400Z I0318 09:55:40.766220 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 09:43:17 +0000 UTC to 2026-03-19 09:43:17 +0000 UTC (now=2026-03-18 09:55:40.766206723 +0000 UTC))" 2026-03-18T09:55:40.767730400Z I0318 09:55:40.766233 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 09:43:18 +0000 UTC to 2027-03-18 09:43:18 +0000 UTC (now=2026-03-18 09:55:40.766225124 +0000 UTC))" 2026-03-18T09:55:40.767730400Z I0318 09:55:40.766247 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 09:43:18 +0000 UTC to 2027-03-18 09:43:18 +0000 UTC (now=2026-03-18 09:55:40.766239224 +0000 UTC))" 2026-03-18T09:55:40.767730400Z I0318 09:55:40.766258 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 09:43:15 +0000 UTC to 2036-03-15 09:43:15 +0000 UTC (now=2026-03-18 09:55:40.766251134 +0000 UTC))" 2026-03-18T09:55:40.767730400Z I0318 09:55:40.766274 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 09:43:16 +0000 UTC to 2026-03-19 09:43:16 +0000 UTC (now=2026-03-18 09:55:40.766262685 +0000 UTC))" 2026-03-18T09:55:40.767730400Z I0318 09:55:40.766400 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773827683\" (2026-03-18 09:55:02 +0000 UTC to 2028-03-17 09:55:03 +0000 UTC (now=2026-03-18 09:55:40.766386488 +0000 UTC))" 2026-03-18T09:55:40.767730400Z I0318 09:55:40.766493 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827739\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827739\" (2026-03-18 08:55:39 +0000 UTC to 2027-03-18 08:55:39 +0000 UTC (now=2026-03-18 09:55:40.76648248 +0000 UTC))" 2026-03-18T09:55:40.815510199Z I0318 09:55:40.815439 1 reflector.go:359] Caches populated for *v1.Secret from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T09:55:41.920557342Z W0318 09:55:41.920484 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:55:41.920557342Z E0318 09:55:41.920524 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:55:45.190250409Z W0318 09:55:45.189522 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:55:45.190250409Z E0318 09:55:45.189559 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:55:50.608501066Z W0318 09:55:50.608423 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:55:50.608501066Z E0318 09:55:50.608465 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:56:01.002614591Z W0318 09:56:01.002512 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:56:01.002614591Z E0318 09:56:01.002547 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:56:20.962594373Z W0318 09:56:20.962482 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:56:20.962594373Z E0318 09:56:20.962523 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:57:07.970397840Z W0318 09:57:07.970317 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:57:07.970397840Z E0318 09:57:07.970349 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:57:42.299009649Z W0318 09:57:42.298953 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:57:42.299009649Z E0318 09:57:42.298985 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T09:58:22.991594873Z W0318 09:58:22.991168 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T09:58:22.991594873Z E0318 09:58:22.991211 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) controller-manager_current.log0000640000000000000000000006043515156473531034067 0ustar0000000000000000config/pod/openshift-controller-manager/logs/controller-manager-f8f5f6bc4-87dt72026-03-18T09:56:56.131955480Z I0318 09:56:56.131915 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T09:56:56.133198901Z I0318 09:56:56.133134 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T09:56:56.134159494Z I0318 09:56:56.134140 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T09:56:56.135551099Z I0318 09:56:56.134956 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T09:56:56.159290236Z I0318 09:56:56.154222 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T09:56:56.190185750Z I0318 09:56:56.189272 1 shared_informer.go:320] Caches are synced for service account 2026-03-18T09:56:56.193986874Z I0318 09:56:56.191245 1 shared_informer.go:320] Caches are synced for service account 2026-03-18T09:56:56.196265201Z I0318 09:56:56.196224 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T09:56:56.215318942Z I0318 09:56:56.213381 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-token-secret 2026-03-18T09:56:56.215318942Z I0318 09:56:56.213420 1 legacy_token_secret_controller.go:110] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-token-secret" 2026-03-18T09:56:56.215318942Z I0318 09:56:56.213446 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret 2026-03-18T09:56:56.215318942Z I0318 09:56:56.213457 1 legacy_image_pull_secret_controller.go:138] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret" 2026-03-18T09:56:56.215318942Z I0318 09:56:56.213469 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_service-account 2026-03-18T09:56:56.215318942Z I0318 09:56:56.213478 1 service_account_controller.go:346] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_service-account" 2026-03-18T09:56:56.221101475Z I0318 09:56:56.221064 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_kids 2026-03-18T09:56:56.221120096Z I0318 09:56:56.221102 1 keyid_observation_controller.go:172] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_kids" 2026-03-18T09:56:56.221292720Z I0318 09:56:56.221274 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_urls 2026-03-18T09:56:56.221292720Z I0318 09:56:56.221288 1 registry_urls_observation_controller.go:147] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_urls" 2026-03-18T09:56:56.221313200Z I0318 09:56:56.221299 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_image-pull-secret 2026-03-18T09:56:56.221320611Z I0318 09:56:56.221313 1 image_pull_secret_controller.go:398] Waiting for service account token signing cert to be observed 2026-03-18T09:56:56.221349211Z I0318 09:56:56.221335 1 image_pull_secret_controller.go:401] "Observed service account token signing certs" kids=["99fijXj4ENlQ39KmqRdcOE1k6N7CD45XtllAon6nZbE"] 2026-03-18T09:56:56.221391942Z I0318 09:56:56.221378 1 image_pull_secret_controller.go:384] Waiting for image registry urls to be observed 2026-03-18T09:56:56.221881364Z I0318 09:56:56.221813 1 shared_informer.go:320] Caches are synced for BuilderRoleBindingController 2026-03-18T09:56:56.224713155Z I0318 09:56:56.223243 1 shared_informer.go:320] Caches are synced for ImagePullerRoleBindingController 2026-03-18T09:56:56.224796747Z I0318 09:56:56.224772 1 factory.go:80] Deployer controller caches are synced. Starting workers. 2026-03-18T09:56:56.230271152Z I0318 09:56:56.229223 1 shared_informer.go:320] Caches are synced for DeployerRoleBindingController 2026-03-18T09:56:56.313211294Z I0318 09:56:56.313079 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T09:56:57.100552241Z W0318 09:56:57.100336 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-18T09:56:57.100552241Z E0318 09:56:57.100391 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" 2026-03-18T09:56:57.259185355Z I0318 09:56:57.258586 1 reflector.go:368] Caches populated for *v1.Event from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T09:56:57.307205253Z W0318 09:56:57.307169 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io) 2026-03-18T09:56:57.307272084Z E0318 09:56:57.307260 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io)" 2026-03-18T09:56:57.350555105Z W0318 09:56:57.350504 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io) 2026-03-18T09:56:57.350632067Z E0318 09:56:57.350550 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io)" 2026-03-18T09:56:57.365397612Z W0318 09:56:57.365343 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-18T09:56:57.365397612Z E0318 09:56:57.365388 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-18T09:56:57.398123212Z W0318 09:56:57.398078 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io) 2026-03-18T09:56:57.398221534Z E0318 09:56:57.398204 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io)" 2026-03-18T09:56:57.593144716Z W0318 09:56:57.593076 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io) 2026-03-18T09:56:57.593144716Z E0318 09:56:57.593130 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io)" 2026-03-18T09:56:59.362761381Z W0318 09:56:59.362671 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io) 2026-03-18T09:56:59.362761381Z E0318 09:56:59.362730 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io)" 2026-03-18T09:56:59.642312686Z W0318 09:56:59.642244 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-18T09:56:59.642346427Z E0318 09:56:59.642308 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" 2026-03-18T09:56:59.780825973Z W0318 09:56:59.780762 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-18T09:56:59.780871524Z E0318 09:56:59.780815 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-18T09:56:59.836411648Z W0318 09:56:59.836350 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io) 2026-03-18T09:56:59.836450149Z E0318 09:56:59.836430 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io)" 2026-03-18T09:57:00.174328917Z W0318 09:57:00.174255 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io) 2026-03-18T09:57:00.174328917Z E0318 09:57:00.174295 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io)" 2026-03-18T09:57:00.262365125Z W0318 09:57:00.262296 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io) 2026-03-18T09:57:00.262365125Z E0318 09:57:00.262335 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io)" 2026-03-18T09:57:03.450769407Z W0318 09:57:03.450734 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io) 2026-03-18T09:57:03.450862619Z E0318 09:57:03.450848 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io)" 2026-03-18T09:57:03.734234709Z W0318 09:57:03.734170 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io) 2026-03-18T09:57:03.734234709Z E0318 09:57:03.734222 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io)" 2026-03-18T09:57:04.074198859Z W0318 09:57:04.074140 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-18T09:57:04.074231270Z E0318 09:57:04.074203 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-18T09:57:04.887379495Z W0318 09:57:04.887280 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-18T09:57:04.887441487Z E0318 09:57:04.887367 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" 2026-03-18T09:57:05.180594779Z W0318 09:57:05.180398 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io) 2026-03-18T09:57:05.180594779Z E0318 09:57:05.180454 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io)" 2026-03-18T09:57:05.708630421Z W0318 09:57:05.708552 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io) 2026-03-18T09:57:05.708663092Z E0318 09:57:05.708622 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io)" 2026-03-18T09:57:10.633168920Z W0318 09:57:10.633076 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-18T09:57:10.633235991Z E0318 09:57:10.633156 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-18T09:57:11.013457487Z W0318 09:57:11.013369 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io) 2026-03-18T09:57:11.013457487Z E0318 09:57:11.013435 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io)" 2026-03-18T09:57:13.326224528Z W0318 09:57:13.326165 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io) 2026-03-18T09:57:13.326374311Z E0318 09:57:13.326348 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io)" 2026-03-18T09:57:13.475571522Z W0318 09:57:13.475489 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io) 2026-03-18T09:57:13.475571522Z E0318 09:57:13.475557 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io)" 2026-03-18T09:57:13.914607512Z W0318 09:57:13.914551 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io) 2026-03-18T09:57:13.914739766Z E0318 09:57:13.914715 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io)" 2026-03-18T09:57:14.346052436Z W0318 09:57:14.345995 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-18T09:57:14.346195949Z E0318 09:57:14.346167 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" 2026-03-18T09:57:29.691286778Z W0318 09:57:29.691234 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-18T09:57:29.691324329Z E0318 09:57:29.691293 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-18T09:57:30.471567111Z W0318 09:57:30.471502 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io) 2026-03-18T09:57:30.471603491Z E0318 09:57:30.471558 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io)" 2026-03-18T09:57:32.090301215Z W0318 09:57:32.090241 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io) 2026-03-18T09:57:32.090441578Z E0318 09:57:32.090413 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server could not find the requested resource (get builds.build.openshift.io)" 2026-03-18T09:57:34.402503921Z W0318 09:57:34.402434 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io) 2026-03-18T09:57:34.402503921Z E0318 09:57:34.402481 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server could not find the requested resource (get deploymentconfigs.apps.openshift.io)" 2026-03-18T09:57:35.155128387Z W0318 09:57:35.154946 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io) 2026-03-18T09:57:35.155128387Z E0318 09:57:35.155007 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server could not find the requested resource (get images.image.openshift.io)" 2026-03-18T09:57:35.979095627Z W0318 09:57:35.979052 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io) 2026-03-18T09:57:35.979173289Z E0318 09:57:35.979158 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server could not find the requested resource (get buildconfigs.build.openshift.io)" 2026-03-18T09:58:09.071873680Z W0318 09:58:09.070859 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T09:58:09.071873680Z E0318 09:58:09.070925 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T09:58:09.342462180Z W0318 09:58:09.342190 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T09:58:09.342462180Z E0318 09:58:09.342248 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T09:58:11.616006532Z W0318 09:58:11.615857 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T09:58:11.616006532Z E0318 09:58:11.615905 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T09:58:17.418241748Z W0318 09:58:17.418169 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T09:58:17.418241748Z E0318 09:58:17.418221 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T09:58:21.295246751Z W0318 09:58:21.295176 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T09:58:21.295246751Z E0318 09:58:21.295219 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T09:58:23.003087963Z W0318 09:58:23.003016 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T09:58:23.003133815Z E0318 09:58:23.003085 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" controller-manager_previous.log0000640000000000000000000001120115156473531034244 0ustar0000000000000000config/pod/openshift-controller-manager/logs/controller-manager-f8f5f6bc4-87dt72026-03-18T09:55:39.116652263Z I0318 09:55:39.116579 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:55:39.117358160Z I0318 09:55:39.117333 1 controller_manager.go:40] Starting controllers on 0.0.0.0:8443 (4.18.0-202602261953.p2.g8ee7440.assembly.stream.el9-8ee7440) 2026-03-18T09:55:39.119948202Z I0318 09:55:39.119927 1 controller_manager.go:51] DeploymentConfig controller using images from "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6e5004457a78b9adf72cb3749b9f84674564ad37dff00ad5cb8415a67ee2bae0" 2026-03-18T09:55:39.119984423Z I0318 09:55:39.119974 1 controller_manager.go:57] Build controller using images from "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e7030c5cce2d163a419586a8c57a77f457845bbf4c38043e3a3954ad65fc439e" 2026-03-18T09:55:39.120024284Z I0318 09:55:39.119985 1 standalone_apiserver.go:108] Started health checks at 0.0.0.0:8443 2026-03-18T09:55:39.120158057Z I0318 09:55:39.120146 1 leaderelection.go:254] attempting to acquire leader lease openshift-controller-manager/openshift-master-controllers... 2026-03-18T09:55:40.603772156Z I0318 09:55:40.603685 1 leaderelection.go:268] successfully acquired lease openshift-controller-manager/openshift-master-controllers 2026-03-18T09:55:40.604269188Z I0318 09:55:40.604235 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-controller-manager", Name:"openshift-master-controllers", UID:"66f15ea6-f236-4947-a0be-9689d2f821e5", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"7388", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' controller-manager-f8f5f6bc4-87dt7 became leader 2026-03-18T09:55:40.631108023Z I0318 09:55:40.631026 1 controller_manager.go:146] Starting "openshift.io/serviceaccount" 2026-03-18T09:55:40.631108023Z I0318 09:55:40.631064 1 serviceaccount.go:16] openshift.io/serviceaccount: no managed names specified 2026-03-18T09:55:40.631108023Z W0318 09:55:40.631075 1 controller_manager.go:153] Skipping "openshift.io/serviceaccount" 2026-03-18T09:55:40.631108023Z I0318 09:55:40.631085 1 controller_manager.go:146] Starting "openshift.io/builder-serviceaccount" 2026-03-18T09:55:40.653182034Z I0318 09:55:40.652544 1 controller_manager.go:156] Started "openshift.io/builder-serviceaccount" 2026-03-18T09:55:40.653182034Z I0318 09:55:40.652582 1 controller_manager.go:146] Starting "openshift.io/image-puller-rolebindings" 2026-03-18T09:55:40.653182034Z I0318 09:55:40.652750 1 serviceaccounts_controller.go:114] "Starting service account controller" 2026-03-18T09:55:40.653182034Z I0318 09:55:40.652816 1 shared_informer.go:313] Waiting for caches to sync for service account 2026-03-18T09:55:40.658332458Z I0318 09:55:40.658259 1 controller_manager.go:156] Started "openshift.io/image-puller-rolebindings" 2026-03-18T09:55:40.658332458Z I0318 09:55:40.658283 1 controller_manager.go:146] Starting "openshift.io/templateinstance" 2026-03-18T09:55:40.658476142Z I0318 09:55:40.658448 1 defaultrolebindings.go:154] Starting ImagePullerRoleBindingController 2026-03-18T09:55:40.658476142Z I0318 09:55:40.658461 1 shared_informer.go:313] Waiting for caches to sync for ImagePullerRoleBindingController 2026-03-18T09:55:40.741988041Z I0318 09:55:40.741680 1 controller_manager.go:156] Started "openshift.io/templateinstance" 2026-03-18T09:55:40.741988041Z I0318 09:55:40.741705 1 controller_manager.go:146] Starting "openshift.io/image-signature-import" 2026-03-18T09:55:40.753225481Z I0318 09:55:40.753126 1 controller_manager.go:156] Started "openshift.io/image-signature-import" 2026-03-18T09:55:40.753225481Z I0318 09:55:40.753155 1 controller_manager.go:146] Starting "openshift.io/origin-namespace" 2026-03-18T09:55:40.808660765Z I0318 09:55:40.808595 1 controller_manager.go:156] Started "openshift.io/origin-namespace" 2026-03-18T09:55:40.808660765Z I0318 09:55:40.808618 1 controller_manager.go:146] Starting "openshift.io/build-config-change" 2026-03-18T09:56:40.655856515Z E0318 09:56:40.655707 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-18T09:56:40.817089602Z F0318 09:56:40.815413 1 client_builder_dynamic.go:154] the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts build-config-change-controller) config/pod/openshift-controller-manager/controller-manager-f8f5f6bc4-87dt7.json0000640000000000000000000002171315156473531026031 0ustar0000000000000000{"metadata":{"name":"controller-manager-f8f5f6bc4-87dt7","generateName":"controller-manager-f8f5f6bc4-","namespace":"openshift-controller-manager","uid":"54e26470-5ffb-4673-9375-e80031cc6750","resourceVersion":"8116","creationTimestamp":"2026-03-18T09:55:21Z","labels":{"app":"openshift-controller-manager-a","controller-manager":"true","openshift-route-controller-manager-anti-affinity":"true","pod-template-hash":"f8f5f6bc4"},"annotations":{"configmaps/client-ca":"6736","configmaps/config":"6734","configmaps/openshift-global-ca":"4360","configmaps/openshift-service-ca":"5169","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.49/23\"],\"mac_address\":\"0a:58:0a:80:00:31\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.49/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.49\"\n ],\n \"mac\": \"0a:58:0a:80:00:31\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","openshiftcontrollermanagers.operator.openshift.io/cluster":"2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"controller-manager-f8f5f6bc4","uid":"3d28f237-9ff2-466a-915b-470d7a4c126e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"client-ca","configMap":{"name":"client-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"proxy-ca-bundles","configMap":{"name":"openshift-global-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"kube-api-access-bkm9m","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","command":["openshift-controller-manager","start"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"proxy-ca-bundles","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-bkm9m","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":10},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000570000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-sa","serviceAccount":"openshift-controller-manager-sa","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c24,c9"},"runAsNonRoot":true,"fsGroup":1000570000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"openshift-controller-manager-a","controller-manager":"true","openshift-route-controller-manager-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:35Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:56:57Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:56:57Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.49","podIPs":[{"ip":"10.128.0.49"}],"startTime":"2026-03-18T09:55:35Z","containerStatuses":[{"name":"controller-manager","state":{"running":{"startedAt":"2026-03-18T09:56:55Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":":40.631075 1 controller_manager.go:153] Skipping \"openshift.io/serviceaccount\"\nI0318 09:55:40.631085 1 controller_manager.go:146] Starting \"openshift.io/builder-serviceaccount\"\nI0318 09:55:40.652544 1 controller_manager.go:156] Started \"openshift.io/builder-serviceaccount\"\nI0318 09:55:40.652582 1 controller_manager.go:146] Starting \"openshift.io/image-puller-rolebindings\"\nI0318 09:55:40.652750 1 serviceaccounts_controller.go:114] \"Starting service account controller\"\nI0318 09:55:40.652816 1 shared_informer.go:313] Waiting for caches to sync for service account\nI0318 09:55:40.658259 1 controller_manager.go:156] Started \"openshift.io/image-puller-rolebindings\"\nI0318 09:55:40.658283 1 controller_manager.go:146] Starting \"openshift.io/templateinstance\"\nI0318 09:55:40.658448 1 defaultrolebindings.go:154] Starting ImagePullerRoleBindingController\nI0318 09:55:40.658461 1 shared_informer.go:313] Waiting for caches to sync for ImagePullerRoleBindingController\nI0318 09:55:40.741680 1 controller_manager.go:156] Started \"openshift.io/templateinstance\"\nI0318 09:55:40.741705 1 controller_manager.go:146] Starting \"openshift.io/image-signature-import\"\nI0318 09:55:40.753126 1 controller_manager.go:156] Started \"openshift.io/image-signature-import\"\nI0318 09:55:40.753155 1 controller_manager.go:146] Starting \"openshift.io/origin-namespace\"\nI0318 09:55:40.808595 1 controller_manager.go:156] Started \"openshift.io/origin-namespace\"\nI0318 09:55:40.808618 1 controller_manager.go:146] Starting \"openshift.io/build-config-change\"\nE0318 09:56:40.655707 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nF0318 09:56:40.815413 1 client_builder_dynamic.go:154] the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts build-config-change-controller)\n","startedAt":"2026-03-18T09:55:38Z","finishedAt":"2026-03-18T09:56:40Z","containerID":"cri-o://1248d2a0db71d324c2c95a679e324dd57a6ddd00508bb65cb77279b8a3a015b8"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","containerID":"cri-o://a3602e50826c30fb0a6aafc5be0e48c4b539e69bcb2efce748d1524de14ad2a2","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"proxy-ca-bundles","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-bkm9m","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator_current.log0000640000000000000000000001021115156473531045221 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-8c94f4649-g25jq2026-03-18T09:57:42.026934902Z I0318 09:57:42.024236 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:57:42.026934902Z I0318 09:57:42.026643 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:57:42.027658060Z I0318 09:57:42.027378 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:42.163487408Z I0318 09:57:42.163127 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602261953.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2026-03-18T09:57:42.480612566Z I0318 09:57:42.480556 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T09:57:42.480612566Z W0318 09:57:42.480582 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:42.480612566Z W0318 09:57:42.480589 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:42.480612566Z W0318 09:57:42.480594 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T09:57:42.480612566Z W0318 09:57:42.480598 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T09:57:42.480612566Z W0318 09:57:42.480601 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T09:57:42.480612566Z W0318 09:57:42.480604 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T09:57:42.482512822Z I0318 09:57:42.482464 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T09:57:42.482779469Z I0318 09:57:42.482750 1 leaderelection.go:254] attempting to acquire leader lease openshift-controller-manager-operator/openshift-controller-manager-operator-lock... 2026-03-18T09:57:42.484204563Z I0318 09:57:42.484172 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T09:57:42.484226534Z I0318 09:57:42.484208 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T09:57:42.484300746Z I0318 09:57:42.484271 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T09:57:42.484312686Z I0318 09:57:42.484306 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:42.484368207Z I0318 09:57:42.484334 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T09:57:42.484407518Z I0318 09:57:42.484395 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:42.484552582Z I0318 09:57:42.484520 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T09:57:42.485058144Z I0318 09:57:42.485033 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T09:57:42.485088825Z I0318 09:57:42.485071 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T09:57:42.584454273Z I0318 09:57:42.584399 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:42.584505074Z I0318 09:57:42.584451 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T09:57:42.584505074Z I0318 09:57:42.584484 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file openshift-controller-manager-operator_previous.log0000640000000000000000000000162615156473531045425 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-8c94f4649-g25jq2026-03-18T09:56:05.075439634Z I0318 09:56:05.075251 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:56:05.075439634Z I0318 09:56:05.075393 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:56:05.075857934Z I0318 09:56:05.075791 1 observer_polling.go:159] Starting file observer 2026-03-18T09:56:55.444306659Z I0318 09:56:55.444221 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602261953.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2026-03-18T09:57:29.570230561Z F0318 09:57:29.569795 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded openshift-controller-manager-operator-8c94f4649-g25jq.json0000640000000000000000000001576115156473531033301 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8c94f4649-g25jq","generateName":"openshift-controller-manager-operator-8c94f4649-","namespace":"openshift-controller-manager-operator","uid":"3646e0cd-49c9-4a98-a2e3-efe9359cc6c4","resourceVersion":"10229","creationTimestamp":"2026-03-18T09:52:38Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8c94f4649"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8c94f4649","uid":"0d277745-868e-497d-bb33-c19cf1920ffc","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-p5dk8","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-p5dk8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c0"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-03-18T09:54:21Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-18T09:57:41Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 09:56:05.075251 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 09:56:05.075393 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 09:56:05.075791 1 observer_polling.go:159] Starting file observer\nI0318 09:56:55.444221 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602261953.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0318 09:57:29.569795 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-03-18T09:56:04Z","finishedAt":"2026-03-18T09:57:29Z","containerID":"cri-o://2795ecc70fe66ee4a0f920912ba6641b4460a6d001aedb4e015ff801933a203d"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","containerID":"cri-o://69f2cdbc33296c63e514edbad7b73c69b46a3bfd3f3df3701dfc360a76760a09","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-p5dk8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-4tlnm/etcd-operator_current.log0000640000000000000000000001055315156473531031313 0ustar00000000000000002026-03-18T09:57:43.078160014Z I0318 09:57:43.077956 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-18T09:57:43.078415900Z I0318 09:57:43.078378 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:57:43.078448671Z I0318 09:57:43.078424 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:57:43.078593944Z I0318 09:57:43.078553 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:43.078914602Z I0318 09:57:43.078866 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:43.305703322Z I0318 09:57:43.305613 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602261953.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-18T09:57:43.931151032Z I0318 09:57:43.931097 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T09:57:43.931151032Z W0318 09:57:43.931123 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:43.931151032Z W0318 09:57:43.931128 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:43.931151032Z W0318 09:57:43.931133 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T09:57:43.931151032Z W0318 09:57:43.931137 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T09:57:43.931151032Z W0318 09:57:43.931141 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T09:57:43.931151032Z W0318 09:57:43.931145 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T09:57:43.940753547Z I0318 09:57:43.940692 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T09:57:43.940753547Z I0318 09:57:43.940739 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T09:57:43.940817828Z I0318 09:57:43.940764 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T09:57:43.940873140Z I0318 09:57:43.940817 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:43.940894920Z I0318 09:57:43.940853 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T09:57:43.940904220Z I0318 09:57:43.940891 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:43.941939906Z I0318 09:57:43.941876 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T09:57:43.944323944Z I0318 09:57:43.942111 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T09:57:43.944323944Z I0318 09:57:43.942149 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-03-18T09:57:43.944323944Z I0318 09:57:43.942158 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T09:57:43.944323944Z I0318 09:57:43.942271 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T09:57:44.041303573Z I0318 09:57:44.041243 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T09:57:44.041303573Z I0318 09:57:44.041253 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:44.041381595Z I0318 09:57:44.041335 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-4tlnm/etcd-operator_previous.log0000640000000000000000000000221415156473531031500 0ustar00000000000000002026-03-18T09:56:56.311333167Z I0318 09:56:56.311170 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-18T09:56:56.311457320Z I0318 09:56:56.311409 1 observer_polling.go:159] Starting file observer 2026-03-18T09:56:56.311739187Z I0318 09:56:56.311717 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:56:56.311802819Z I0318 09:56:56.311780 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:56:56.314298981Z I0318 09:56:56.312896 1 observer_polling.go:159] Starting file observer 2026-03-18T09:56:56.342158740Z I0318 09:56:56.342110 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602261953.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-18T09:57:29.576924805Z F0318 09:57:29.569113 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-4tlnm.json0000640000000000000000000001766415156473531024237 0ustar0000000000000000{"metadata":{"name":"etcd-operator-8544cbcf9c-4tlnm","generateName":"etcd-operator-8544cbcf9c-","namespace":"openshift-etcd-operator","uid":"a078565a-6970-4f42-84f4-938f1d637245","resourceVersion":"10255","creationTimestamp":"2026-03-18T09:52:39Z","labels":{"app":"etcd-operator","pod-template-hash":"8544cbcf9c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-8544cbcf9c","uid":"369d4cb2-69c3-4136-89f9-4bb6bf74991a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-cxv6v","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-cxv6v","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:41Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:43Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2026-03-18T09:54:21Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-18T09:57:43Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 09:56:56.311170 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/\nI0318 09:56:56.311409 1 observer_polling.go:159] Starting file observer\nI0318 09:56:56.311717 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 09:56:56.311780 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 09:56:56.312896 1 observer_polling.go:159] Starting file observer\nI0318 09:56:56.342110 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602261953.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934\nF0318 09:57:29.569113 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-03-18T09:56:56Z","finishedAt":"2026-03-18T09:57:29Z","containerID":"cri-o://ff998e161f24e27e62ffb41d5f1af2c4149f9709b9260bb197fe3f8937665152"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","containerID":"cri-o://53e820dc65799d326622907d56bfabcb65416af56a015afddd831825233f23fe","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-cxv6v","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002745715156473531034051 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-687747fbb4-k7dnf2026-03-18T09:55:34.906992907Z W0318 09:55:34.906752 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-18T09:55:34.907447528Z I0318 09:55:34.907349 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773827734 cert, and key in /tmp/serving-cert-1537368664/serving-signer.crt, /tmp/serving-cert-1537368664/serving-signer.key 2026-03-18T09:55:35.509542972Z I0318 09:55:35.509456 1 observer_polling.go:159] Starting file observer 2026-03-18T09:55:36.906710971Z I0318 09:55:36.904230 1 builder.go:304] check-endpoints version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-18T09:55:36.906710971Z I0318 09:55:36.905752 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-1537368664/tls.crt::/tmp/serving-cert-1537368664/tls.key" 2026-03-18T09:55:37.850642348Z I0318 09:55:37.850534 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-18T09:55:37.856907609Z I0318 09:55:37.853126 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-18T09:55:37.856907609Z I0318 09:55:37.853157 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-18T09:55:37.856907609Z I0318 09:55:37.853187 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-18T09:55:37.856907609Z I0318 09:55:37.853198 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-18T09:55:37.860859844Z I0318 09:55:37.858833 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T09:55:37.860859844Z W0318 09:55:37.858922 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:55:37.860859844Z W0318 09:55:37.858928 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:55:37.860859844Z W0318 09:55:37.858932 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T09:55:37.860859844Z W0318 09:55:37.858935 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T09:55:37.860859844Z W0318 09:55:37.858937 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T09:55:37.860859844Z W0318 09:55:37.858940 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T09:55:37.860859844Z I0318 09:55:37.858884 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-18T09:55:39.047895839Z I0318 09:55:39.046999 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1537368664/tls.crt::/tmp/serving-cert-1537368664/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773827734\" (2026-03-18 09:55:34 +0000 UTC to 2026-04-17 09:55:35 +0000 UTC (now=2026-03-18 09:55:39.046918645 +0000 UTC))" 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047179 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827737\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827737\" (2026-03-18 08:55:36 +0000 UTC to 2027-03-18 08:55:36 +0000 UTC (now=2026-03-18 09:55:39.047155921 +0000 UTC))" 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047197 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047219 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047240 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047263 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047302 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-1537368664/tls.crt::/tmp/serving-cert-1537368664/tls.key" 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047399 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047493 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047501 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047516 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047524 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047587 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T09:55:39.047895839Z I0318 09:55:39.047595 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T09:55:39.051197098Z I0318 09:55:39.050037 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:55:39.051197098Z I0318 09:55:39.050260 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:55:39.051197098Z I0318 09:55:39.050998 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:55:39.147507155Z I0318 09:55:39.147427 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T09:55:39.147597017Z I0318 09:55:39.147564 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:55:39.147658979Z I0318 09:55:39.147617 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:55:39.147773491Z I0318 09:55:39.147740 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 09:43:16 +0000 UTC to 2026-03-19 09:43:16 +0000 UTC (now=2026-03-18 09:55:39.14771699 +0000 UTC))" 2026-03-18T09:55:39.147910235Z I0318 09:55:39.147879 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1537368664/tls.crt::/tmp/serving-cert-1537368664/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773827734\" (2026-03-18 09:55:34 +0000 UTC to 2026-04-17 09:55:35 +0000 UTC (now=2026-03-18 09:55:39.147867794 +0000 UTC))" 2026-03-18T09:55:39.147996737Z I0318 09:55:39.147976 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827737\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827737\" (2026-03-18 08:55:36 +0000 UTC to 2027-03-18 08:55:36 +0000 UTC (now=2026-03-18 09:55:39.147965226 +0000 UTC))" 2026-03-18T09:55:39.148083949Z I0318 09:55:39.148063 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 09:36:55 +0000 UTC to 2036-03-15 09:36:55 +0000 UTC (now=2026-03-18 09:55:39.148052928 +0000 UTC))" 2026-03-18T09:55:39.148083949Z I0318 09:55:39.148080 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 09:43:17 +0000 UTC to 2026-03-19 09:43:17 +0000 UTC (now=2026-03-18 09:55:39.148072269 +0000 UTC))" 2026-03-18T09:55:39.148109440Z I0318 09:55:39.148093 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 09:43:18 +0000 UTC to 2027-03-18 09:43:18 +0000 UTC (now=2026-03-18 09:55:39.148083989 +0000 UTC))" 2026-03-18T09:55:39.148118650Z I0318 09:55:39.148107 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 09:43:18 +0000 UTC to 2027-03-18 09:43:18 +0000 UTC (now=2026-03-18 09:55:39.148098379 +0000 UTC))" 2026-03-18T09:55:39.148127350Z I0318 09:55:39.148120 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 09:43:15 +0000 UTC to 2036-03-15 09:43:15 +0000 UTC (now=2026-03-18 09:55:39.14811164 +0000 UTC))" 2026-03-18T09:55:39.148138080Z I0318 09:55:39.148132 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 09:43:16 +0000 UTC to 2026-03-19 09:43:16 +0000 UTC (now=2026-03-18 09:55:39.14812512 +0000 UTC))" 2026-03-18T09:55:39.148240323Z I0318 09:55:39.148219 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1537368664/tls.crt::/tmp/serving-cert-1537368664/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773827734\" (2026-03-18 09:55:34 +0000 UTC to 2026-04-17 09:55:35 +0000 UTC (now=2026-03-18 09:55:39.148210652 +0000 UTC))" 2026-03-18T09:55:39.148325475Z I0318 09:55:39.148306 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827737\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827737\" (2026-03-18 08:55:36 +0000 UTC to 2027-03-18 08:55:36 +0000 UTC (now=2026-03-18 09:55:39.148297284 +0000 UTC))" 2026-03-18T09:55:40.117531659Z I0318 09:55:40.117448 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-18T09:55:40.461799641Z I0318 09:55:40.461737 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:55:40.517904590Z I0318 09:55:40.517815 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-18T09:55:40.517904590Z I0318 09:55:40.517870 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-687747fbb4-k7dnf/openshift-apiserver_current.log0000640000000000000000000011516215156473531031043 0ustar00000000000000002026-03-18T09:58:15.212350739Z E0318 09:58:15.212326 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:15.212350739Z E0318 09:58:15.212330 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:15.212350739Z E0318 09:58:15.211330 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:15.212378860Z E0318 09:58:15.212346 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:15.212440421Z E0318 09:58:15.211346 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:15.212600745Z E0318 09:58:15.212330 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:21.703893974Z I0318 09:58:21.703808 1 policy_source.go:224] refreshing policies 2026-03-18T09:58:21.713794926Z I0318 09:58:21.713706 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-18T09:58:21.716352539Z I0318 09:58:21.716299 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:58:22.734029230Z I0318 09:58:22.733969 1 policy_source.go:224] refreshing policies 2026-03-18T09:58:33.091205902Z E0318 09:58:33.090204 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.091205902Z E0318 09:58:33.090263 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.091205902Z E0318 09:58:33.090367 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.091205902Z E0318 09:58:33.090479 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.091205902Z E0318 09:58:33.090555 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.091205902Z E0318 09:58:33.090619 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.091205902Z E0318 09:58:33.090208 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.091205902Z E0318 09:58:33.090739 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.091205902Z E0318 09:58:33.090773 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.091205902Z E0318 09:58:33.090904 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.224189301Z E0318 09:58:33.223861 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.224189301Z E0318 09:58:33.223873 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.224189301Z E0318 09:58:33.223960 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.224189301Z E0318 09:58:33.223994 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.224189301Z E0318 09:58:33.224009 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.634796632Z E0318 09:58:33.634718 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.634865493Z E0318 09:58:33.634805 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.634931215Z E0318 09:58:33.634902 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.634982576Z E0318 09:58:33.634808 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.635230032Z E0318 09:58:33.635128 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.876082826Z E0318 09:58:33.874005 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.876082826Z E0318 09:58:33.874132 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.876082826Z E0318 09:58:33.874442 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.876082826Z E0318 09:58:33.874439 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:33.876082826Z E0318 09:58:33.874569 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.152538470Z E0318 09:58:34.152455 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.152862288Z E0318 09:58:34.152793 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.153135135Z E0318 09:58:34.153073 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.153192696Z E0318 09:58:34.153157 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.153511394Z E0318 09:58:34.153462 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.153624526Z E0318 09:58:34.153588 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.153690328Z E0318 09:58:34.153660 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.153850242Z E0318 09:58:34.153779 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.154046557Z E0318 09:58:34.154000 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.154131559Z E0318 09:58:34.154084 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.221150186Z E0318 09:58:34.221097 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.221279289Z E0318 09:58:34.221251 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.221357771Z E0318 09:58:34.221297 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.221405892Z E0318 09:58:34.221143 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.221521835Z E0318 09:58:34.221468 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.620367429Z E0318 09:58:34.620310 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.620844721Z E0318 09:58:34.620806 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.621136048Z E0318 09:58:34.621115 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.621409075Z E0318 09:58:34.621389 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:34.621708522Z E0318 09:58:34.621688 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.187421787Z E0318 09:58:45.187266 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.187747795Z E0318 09:58:45.187676 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.187781725Z E0318 09:58:45.187735 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.188048252Z E0318 09:58:45.187991 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.189712023Z E0318 09:58:45.189658 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.219728786Z E0318 09:58:45.219654 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220041044Z E0318 09:58:45.219952 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220096365Z E0318 09:58:45.220048 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220117075Z E0318 09:58:45.220074 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220141816Z E0318 09:58:45.220127 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220232408Z E0318 09:58:45.219671 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220232408Z E0318 09:58:45.220220 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220446053Z E0318 09:58:45.220404 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220535456Z E0318 09:58:45.220487 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220623698Z E0318 09:58:45.220584 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220644858Z E0318 09:58:45.220618 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220724740Z E0318 09:58:45.220487 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220864084Z E0318 09:58:45.220800 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220864084Z E0318 09:58:45.220424 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220958436Z E0318 09:58:45.220915 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220958436Z E0318 09:58:45.220930 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.220958436Z E0318 09:58:45.220939 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.221001907Z E0318 09:58:45.220498 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.221088559Z E0318 09:58:45.220408 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.223127849Z E0318 09:58:45.223079 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.223594660Z E0318 09:58:45.223555 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.223929339Z E0318 09:58:45.223885 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.232177820Z E0318 09:58:45.223988 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.232177820Z E0318 09:58:45.223884 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.232177820Z E0318 09:58:45.224082 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.232177820Z E0318 09:58:45.224247 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.232177820Z E0318 09:58:45.224248 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.232177820Z E0318 09:58:45.224369 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.236005524Z E0318 09:58:45.235620 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.236325261Z E0318 09:58:45.236268 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.236357552Z E0318 09:58:45.236325 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.236472985Z E0318 09:58:45.236433 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.236556367Z E0318 09:58:45.236493 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.236581828Z E0318 09:58:45.236556 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.236968207Z E0318 09:58:45.236918 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.237159492Z E0318 09:58:45.237113 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.237323516Z E0318 09:58:45.237283 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.237522071Z E0318 09:58:45.237457 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.238062584Z E0318 09:58:45.237980 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" 2026-03-18T09:58:45.238485724Z E0318 09:58:45.238431 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=6680627890217783272, SKID=B0:D3:74:FD:A7:82:C9:33:BD:D0:74:29:D9:87:69:A0:F0:59:5C:84, AKID=2C:65:FC:6E:10:EF:DB:BE:76:D3:65:07:91:C6:D4:A8:1E:18:15:0F failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000005517715156473531040032 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-zz68c2026-03-18T09:58:13.075743783Z > 2026-03-18T09:58:14.873722096Z E0318 09:58:14.873654 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T09:58:14.873722096Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401 2026-03-18T09:58:14.873722096Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T09:58:14.873722096Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401 2026-03-18T09:58:14.873722096Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401 2026-03-18T09:58:14.873722096Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401 2026-03-18T09:58:14.873722096Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401 2026-03-18T09:58:14.873722096Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401 2026-03-18T09:58:14.873722096Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401 2026-03-18T09:58:14.873722096Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401 2026-03-18T09:58:14.873722096Z > 2026-03-18T09:58:16.346683511Z I0318 09:58:16.346214 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T09:58:16.672645994Z E0318 09:58:16.672583 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T09:58:16.672645994Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401 2026-03-18T09:58:16.672645994Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T09:58:16.672645994Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401 2026-03-18T09:58:16.672645994Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401 2026-03-18T09:58:16.672645994Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401 2026-03-18T09:58:16.672645994Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401 2026-03-18T09:58:16.672645994Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401 2026-03-18T09:58:16.672645994Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401 2026-03-18T09:58:16.672645994Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401 2026-03-18T09:58:16.672645994Z > 2026-03-18T09:58:18.474896011Z E0318 09:58:18.474407 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T09:58:18.474896011Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401 2026-03-18T09:58:18.474896011Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T09:58:18.474896011Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401 2026-03-18T09:58:18.474896011Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401 2026-03-18T09:58:18.474896011Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401 2026-03-18T09:58:18.474896011Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401 2026-03-18T09:58:18.474896011Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401 2026-03-18T09:58:18.474896011Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401 2026-03-18T09:58:18.474896011Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401 2026-03-18T09:58:18.474896011Z > 2026-03-18T09:58:19.893726193Z I0318 09:58:19.893624 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T09:58:20.275343046Z E0318 09:58:20.275287 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T09:58:20.275343046Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401 2026-03-18T09:58:20.275343046Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T09:58:20.275343046Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401 2026-03-18T09:58:20.275343046Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401 2026-03-18T09:58:20.275343046Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401 2026-03-18T09:58:20.275343046Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401 2026-03-18T09:58:20.275343046Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401 2026-03-18T09:58:20.275343046Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401 2026-03-18T09:58:20.275343046Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401 2026-03-18T09:58:20.275343046Z > 2026-03-18T09:58:23.047567070Z I0318 09:58:23.045780 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T09:58:25.007385477Z I0318 09:58:25.007336 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T09:58:25.028737629Z E0318 09:58:25.028679 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T09:58:25.028737629Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401 2026-03-18T09:58:25.028737629Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T09:58:25.028737629Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401 2026-03-18T09:58:25.028737629Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401 2026-03-18T09:58:25.028737629Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401 2026-03-18T09:58:25.028737629Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401 2026-03-18T09:58:25.028737629Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401 2026-03-18T09:58:25.028737629Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401 2026-03-18T09:58:25.028737629Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401 2026-03-18T09:58:25.028737629Z > 2026-03-18T09:58:25.033505045Z I0318 09:58:25.033471 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T09:58:26.216868325Z I0318 09:58:26.212743 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T09:58:27.414721788Z I0318 09:58:27.413311 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T09:58:29.096370390Z E0318 09:58:29.096296 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T09:58:29.096370390Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401 2026-03-18T09:58:29.096370390Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T09:58:29.096370390Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401 2026-03-18T09:58:29.096370390Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401 2026-03-18T09:58:29.096370390Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401 2026-03-18T09:58:29.096370390Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401 2026-03-18T09:58:29.096370390Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401 2026-03-18T09:58:29.096370390Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401 2026-03-18T09:58:29.096370390Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401 2026-03-18T09:58:29.096370390Z > 2026-03-18T09:58:30.386169059Z I0318 09:58:30.386128 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T09:58:33.886393458Z I0318 09:58:33.885813 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T09:58:45.584437116Z E0318 09:58:45.584352 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T09:58:45.584437116Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401 2026-03-18T09:58:45.584437116Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T09:58:45.584437116Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401 2026-03-18T09:58:45.584437116Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401 2026-03-18T09:58:45.584437116Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401 2026-03-18T09:58:45.584437116Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401 2026-03-18T09:58:45.584437116Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401 2026-03-18T09:58:45.584437116Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401 2026-03-18T09:58:45.584437116Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401 2026-03-18T09:58:45.584437116Z > 2026-03-18T09:58:45.675192623Z I0318 09:58:45.675150 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T09:58:45.682428960Z E0318 09:58:45.682362 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T09:58:45.682428960Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401 2026-03-18T09:58:45.682428960Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T09:58:45.682428960Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401 2026-03-18T09:58:45.682428960Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401 2026-03-18T09:58:45.682428960Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401 2026-03-18T09:58:45.682428960Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401 2026-03-18T09:58:45.682428960Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401 2026-03-18T09:58:45.682428960Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401 2026-03-18T09:58:45.682428960Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401 2026-03-18T09:58:45.682428960Z > 2026-03-18T09:58:45.682946392Z I0318 09:58:45.682926 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. openshift-apiserver-operator_previous.log0000640000000000000000000000145215156473531040207 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-zz68c2026-03-18T09:56:56.360407271Z I0318 09:56:56.360258 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:56:56.360407271Z I0318 09:56:56.360384 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:56:56.361373015Z I0318 09:56:56.361334 1 observer_polling.go:159] Starting file observer 2026-03-18T09:56:56.403890237Z I0318 09:56:56.403676 1 builder.go:304] openshift-apiserver-operator version - 2026-03-18T09:57:29.566866509Z F0318 09:57:29.566442 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-zz68c.json0000640000000000000000000001566615156473531027744 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-d65958b8-zz68c","generateName":"openshift-apiserver-operator-d65958b8-","namespace":"openshift-apiserver-operator","uid":"0d72e695-0183-4ee8-8add-5425e67f7138","resourceVersion":"10300","creationTimestamp":"2026-03-18T09:52:42Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"d65958b8"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.24/23\"],\"mac_address\":\"0a:58:0a:80:00:18\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.24/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.24\"\n ],\n \"mac\": \"0a:58:0a:80:00:18\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-d65958b8","uid":"8e8949c9-0f47-4608-a65a-8f82dca6a2f5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-g6bvr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-g6bvr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c4"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.24","podIPs":[{"ip":"10.128.0.24"}],"startTime":"2026-03-18T09:54:21Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-18T09:57:43Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 09:56:56.360258 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 09:56:56.360384 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 09:56:56.361334 1 observer_polling.go:159] Starting file observer\nI0318 09:56:56.403676 1 builder.go:304] openshift-apiserver-operator version -\nF0318 09:57:29.566442 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-03-18T09:56:56Z","finishedAt":"2026-03-18T09:57:29Z","containerID":"cri-o://d7fed381f588321bf949c1ee4979e243946541c605dea6e2da6f26ae56dbca2b"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","containerID":"cri-o://7d6fd2e1bc4be1b2a613ed03b0fa77f5671b8e216ea0aab842b063aa213fff8f","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-g6bvr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515156473531043076 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-vj8tt2026-03-18T09:57:42.007540079Z I0318 09:57:42.007366 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:57:42.007540079Z I0318 09:57:42.007475 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:57:42.007907228Z I0318 09:57:42.007871 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:42.163118679Z I0318 09:57:42.163039 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202603040208.p2.g4e99db6.assembly.stream.el9-4e99db6-4e99db62cea1d2ca48765230c6f5663d1f2c2702 2026-03-18T09:57:42.498598975Z I0318 09:57:42.498527 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T09:57:42.498598975Z W0318 09:57:42.498560 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:42.498598975Z W0318 09:57:42.498566 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:42.498598975Z W0318 09:57:42.498572 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T09:57:42.498598975Z W0318 09:57:42.498576 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T09:57:42.498598975Z W0318 09:57:42.498579 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T09:57:42.498598975Z W0318 09:57:42.498583 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T09:57:42.500741647Z I0318 09:57:42.500704 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T09:57:42.501041225Z I0318 09:57:42.501015 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-03-18T09:57:42.501908216Z I0318 09:57:42.501877 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T09:57:42.501924366Z I0318 09:57:42.501911 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T09:57:42.501975968Z I0318 09:57:42.501949 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T09:57:42.501975968Z I0318 09:57:42.501962 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T09:57:42.501984938Z I0318 09:57:42.501971 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:42.501984938Z I0318 09:57:42.501979 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:42.502967122Z I0318 09:57:42.502222 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T09:57:42.503094835Z I0318 09:57:42.503075 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T09:57:42.503159867Z I0318 09:57:42.503146 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T09:57:42.602852602Z I0318 09:57:42.602740 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:42.602852602Z I0318 09:57:42.602806 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:42.602894353Z I0318 09:57:42.602863 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController kube-scheduler-operator-container_previous.log0000640000000000000000000000163215156473531043273 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-vj8tt2026-03-18T09:56:56.528489039Z I0318 09:56:56.527145 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:56:56.528489039Z I0318 09:56:56.527286 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:56:56.537942713Z I0318 09:56:56.531077 1 observer_polling.go:159] Starting file observer 2026-03-18T09:56:56.568363826Z I0318 09:56:56.566793 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202603040208.p2.g4e99db6.assembly.stream.el9-4e99db6-4e99db62cea1d2ca48765230c6f5663d1f2c2702 2026-03-18T09:57:29.574170297Z F0318 09:57:29.573359 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-vj8tt.json0000640000000000000000000001526615156473531032137 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-dddff6458-vj8tt","generateName":"openshift-kube-scheduler-operator-dddff6458-","namespace":"openshift-kube-scheduler-operator","uid":"3414fa1f-e4ee-4c7e-81cd-1fbd86486cd6","resourceVersion":"10225","creationTimestamp":"2026-03-18T09:52:39Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"dddff6458"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.6/23\"],\"mac_address\":\"0a:58:0a:80:00:06\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.6/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.6\"\n ],\n \"mac\": \"0a:58:0a:80:00:06\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-dddff6458","uid":"2161a0f9-d942-428b-a15d-2fd1989b1e0b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.6","podIPs":[{"ip":"10.128.0.6"}],"startTime":"2026-03-18T09:54:21Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-18T09:57:41Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 09:56:56.527145 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 09:56:56.527286 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 09:56:56.531077 1 observer_polling.go:159] Starting file observer\nI0318 09:56:56.566793 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202603040208.p2.g4e99db6.assembly.stream.el9-4e99db6-4e99db62cea1d2ca48765230c6f5663d1f2c2702\nF0318 09:57:29.573359 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-03-18T09:56:56Z","finishedAt":"2026-03-18T09:57:29Z","containerID":"cri-o://ece038fe79c27be1029079683dfa33a1fa90e9515d0fac47aae2ee51f3ffd2df"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","containerID":"cri-o://642fd807a249600061935e2bfe571679562d4d8cdf9ba7e3c80d0e780f80247e","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-recovery-controller_current.log0000640000000000000000000004312715156473531036605 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-03-18T09:57:34.204938725Z + timeout 3m /bin/bash -exuo pipefail -c 'while [ -n "$(ss -Htanop \( sport = 11443 \))" ]; do sleep 1; done' 2026-03-18T09:57:34.208151084Z ++ ss -Htanop '(' sport = 11443 ')' 2026-03-18T09:57:34.218201199Z + '[' -n '' ']' 2026-03-18T09:57:34.219149422Z + exec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=openshift-kube-scheduler --listen=0.0.0.0:11443 -v=2 2026-03-18T09:57:34.274755661Z W0318 09:57:34.274606 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-18T09:57:34.274969876Z I0318 09:57:34.274930 1 crypto.go:601] Generating new CA for cert-recovery-controller-signer@1773827854 cert, and key in /tmp/serving-cert-3948277217/serving-signer.crt, /tmp/serving-cert-3948277217/serving-signer.key 2026-03-18T09:57:34.612068210Z I0318 09:57:34.612004 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:57:34.612776618Z I0318 09:57:34.612732 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:34.612997463Z I0318 09:57:34.612971 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T09:57:34.612997463Z I0318 09:57:34.612989 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T09:57:34.616780835Z W0318 09:57:34.616735 1 builder.go:272] unable to get owner reference (falling back to namespace): Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/pods": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:34.616971720Z I0318 09:57:34.616940 1 builder.go:304] cert-recovery-controller version v0.0.0-master+$Format:%H$-$Format:%H$ 2026-03-18T09:57:34.622628848Z W0318 09:57:34.622516 1 builder.go:364] unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:34.622690200Z I0318 09:57:34.622645 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-scheduler", Name:"openshift-kube-scheduler", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ControlPlaneTopology' unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:34.623188532Z I0318 09:57:34.623170 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler/cert-recovery-controller-lock... 2026-03-18T09:57:34.626213826Z E0318 09:57:34.626174 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:34.626838461Z E0318 09:57:34.626654 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189de7091f778cd1 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,LastTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:57:39.446332100Z E0318 09:57:39.445990 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189de7091f778cd1 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,LastTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:57:49.451624924Z E0318 09:57:49.451523 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189de7091f778cd1 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,LastTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:57:59.456659973Z E0318 09:57:59.456540 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189de7091f778cd1 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,LastTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:58:09.461901038Z E0318 09:58:09.461738 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189de7091f778cd1 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,LastTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:58:19.466303941Z E0318 09:58:19.466229 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189de7091f778cd1 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,LastTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:58:29.470766766Z E0318 09:58:29.470694 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189de7091f778cd1 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,LastTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:58:31.316663801Z E0318 09:58:31.316577 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:58:39.474514832Z E0318 09:58:39.474440 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-scheduler.189de7091f778cd1 openshift-kube-scheduler 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-scheduler,Name:openshift-kube-scheduler,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,LastTimestamp:2026-03-18 09:57:34.622493905 +0000 UTC m=+0.400149006,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" kube-scheduler-cert-syncer_current.log0000640000000000000000000003546115156473531035026 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-03-18T09:57:34.039945404Z I0318 09:57:34.039737 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:34.040131959Z I0318 09:57:34.040058 1 base_controller.go:76] Waiting for caches to sync for CertSyncController 2026-03-18T09:57:34.048673058Z W0318 09:57:34.048091 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:34.048673058Z E0318 09:57:34.048177 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:34.049054157Z W0318 09:57:34.048995 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:34.049096068Z E0318 09:57:34.049074 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:35.171079007Z W0318 09:57:35.170891 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:35.171079007Z E0318 09:57:35.170942 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:35.411683865Z W0318 09:57:35.411475 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:35.411683865Z E0318 09:57:35.411532 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:37.581267067Z W0318 09:57:37.581198 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:37.581267067Z E0318 09:57:37.581241 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:38.039581963Z W0318 09:57:38.039494 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:38.039581963Z E0318 09:57:38.039550 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:41.351430721Z W0318 09:57:41.351318 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:41.351504133Z E0318 09:57:41.351426 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:41.519634770Z W0318 09:57:41.519546 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:41.519685371Z E0318 09:57:41.519632 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:53.117068470Z W0318 09:57:53.116991 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:53.117102771Z E0318 09:57:53.117059 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:54.021492685Z W0318 09:57:54.021219 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:54.021492685Z E0318 09:57:54.021275 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:58:06.024111655Z W0318 09:58:06.024013 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:58:06.024111655Z E0318 09:58:06.024082 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:58:16.702799930Z W0318 09:58:16.702731 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:58:16.702799930Z E0318 09:58:16.702792 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:58:40.753608430Z W0318 09:58:40.753498 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:58:40.753608430Z E0318 09:58:40.753564 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-scheduler/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" kube-scheduler_current.log0000640000000000000000000004773515156473531032601 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-03-18T09:57:34.161023552Z weight: 2 2026-03-18T09:57:34.161023552Z - name: InterPodAffinity 2026-03-18T09:57:34.161023552Z weight: 2 2026-03-18T09:57:34.161023552Z - name: DefaultPreemption 2026-03-18T09:57:34.161023552Z weight: 0 2026-03-18T09:57:34.161023552Z - name: NodeResourcesBalancedAllocation 2026-03-18T09:57:34.161023552Z weight: 1 2026-03-18T09:57:34.161023552Z - name: ImageLocality 2026-03-18T09:57:34.161023552Z weight: 1 2026-03-18T09:57:34.161023552Z - name: DefaultBinder 2026-03-18T09:57:34.161023552Z weight: 0 2026-03-18T09:57:34.161023552Z permit: {} 2026-03-18T09:57:34.161023552Z postBind: {} 2026-03-18T09:57:34.161023552Z postFilter: {} 2026-03-18T09:57:34.161023552Z preBind: {} 2026-03-18T09:57:34.161023552Z preEnqueue: {} 2026-03-18T09:57:34.161023552Z preFilter: {} 2026-03-18T09:57:34.161023552Z preScore: {} 2026-03-18T09:57:34.161023552Z queueSort: {} 2026-03-18T09:57:34.161023552Z reserve: {} 2026-03-18T09:57:34.161023552Z score: {} 2026-03-18T09:57:34.161023552Z schedulerName: default-scheduler 2026-03-18T09:57:34.161023552Z > 2026-03-18T09:57:34.163472392Z I0318 09:57:34.163415 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-18T09:57:34.163472392Z I0318 09:57:34.163456 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-18T09:57:34.170781991Z I0318 09:57:34.170395 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" certDetail="\"scheduler.openshift-kube-scheduler.svc\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773827683\" (2026-03-18 09:54:52 +0000 UTC to 2028-03-17 09:54:53 +0000 UTC (now=2026-03-18 09:57:34.170360971 +0000 UTC))" 2026-03-18T09:57:34.170781991Z I0318 09:57:34.170538 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827854\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827853\" (2026-03-18 08:57:33 +0000 UTC to 2029-03-18 08:57:33 +0000 UTC (now=2026-03-18 09:57:34.170521424 +0000 UTC))" 2026-03-18T09:57:34.170781991Z I0318 09:57:34.170575 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-18T09:57:34.170781991Z I0318 09:57:34.170672 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T09:57:34.170781991Z I0318 09:57:34.170693 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T09:57:34.170781991Z I0318 09:57:34.170732 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T09:57:34.170781991Z I0318 09:57:34.170753 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" 2026-03-18T09:57:34.170851623Z I0318 09:57:34.170759 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T09:57:34.170851623Z I0318 09:57:34.170801 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:34.170851623Z I0318 09:57:34.170799 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T09:57:34.170888153Z I0318 09:57:34.170864 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:34.176909900Z I0318 09:57:34.176850 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.176938871Z I0318 09:57:34.176876 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.177019263Z I0318 09:57:34.176988 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-18T09:57:34.177084295Z I0318 09:57:34.176993 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-18T09:57:34.177123636Z I0318 09:57:34.177102 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.177204428Z I0318 09:57:34.177176 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.178521320Z I0318 09:57:34.177336 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.178521320Z I0318 09:57:34.177532 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.178521320Z I0318 09:57:34.177636 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-18T09:57:34.178521320Z I0318 09:57:34.178267 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.178521320Z I0318 09:57:34.178315 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.178521320Z I0318 09:57:34.178366 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.189763624Z I0318 09:57:34.189698 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.191304612Z I0318 09:57:34.191275 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.191481796Z I0318 09:57:34.191433 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-18T09:57:34.195278529Z I0318 09:57:34.195110 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.196021177Z I0318 09:57:34.195954 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.204727980Z I0318 09:57:34.204665 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.205209722Z I0318 09:57:34.205178 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-18T09:57:34.271059571Z I0318 09:57:34.270986 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:34.271059571Z I0318 09:57:34.271014 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:34.271107032Z I0318 09:57:34.271068 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T09:57:34.271322407Z I0318 09:57:34.271255 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 09:43:16 +0000 UTC to 2026-03-19 09:43:16 +0000 UTC (now=2026-03-18 09:57:34.271229095 +0000 UTC))" 2026-03-18T09:57:34.271322407Z I0318 09:57:34.271306 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler/kube-scheduler... 2026-03-18T09:57:34.271578923Z I0318 09:57:34.271536 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" certDetail="\"scheduler.openshift-kube-scheduler.svc\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773827683\" (2026-03-18 09:54:52 +0000 UTC to 2028-03-17 09:54:53 +0000 UTC (now=2026-03-18 09:57:34.271519402 +0000 UTC))" 2026-03-18T09:57:34.271950882Z I0318 09:57:34.271723 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827854\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827853\" (2026-03-18 08:57:33 +0000 UTC to 2029-03-18 08:57:33 +0000 UTC (now=2026-03-18 09:57:34.271706986 +0000 UTC))" 2026-03-18T09:57:34.271950882Z I0318 09:57:34.271900 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 09:36:55 +0000 UTC to 2036-03-15 09:36:55 +0000 UTC (now=2026-03-18 09:57:34.271889871 +0000 UTC))" 2026-03-18T09:57:34.271950882Z I0318 09:57:34.271921 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 09:43:17 +0000 UTC to 2026-03-19 09:43:17 +0000 UTC (now=2026-03-18 09:57:34.271914181 +0000 UTC))" 2026-03-18T09:57:34.271950882Z I0318 09:57:34.271940 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 09:43:18 +0000 UTC to 2027-03-18 09:43:18 +0000 UTC (now=2026-03-18 09:57:34.271932952 +0000 UTC))" 2026-03-18T09:57:34.271978333Z I0318 09:57:34.271956 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 09:43:18 +0000 UTC to 2027-03-18 09:43:18 +0000 UTC (now=2026-03-18 09:57:34.271951102 +0000 UTC))" 2026-03-18T09:57:34.271995733Z I0318 09:57:34.271973 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 09:43:15 +0000 UTC to 2036-03-15 09:43:15 +0000 UTC (now=2026-03-18 09:57:34.271967193 +0000 UTC))" 2026-03-18T09:57:34.272016044Z I0318 09:57:34.271997 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 09:43:16 +0000 UTC to 2026-03-19 09:43:16 +0000 UTC (now=2026-03-18 09:57:34.271991883 +0000 UTC))" 2026-03-18T09:57:34.272209269Z I0318 09:57:34.272171 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt::/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key" certDetail="\"scheduler.openshift-kube-scheduler.svc\" [serving] validServingFor=[scheduler.openshift-kube-scheduler.svc,scheduler.openshift-kube-scheduler.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773827683\" (2026-03-18 09:54:52 +0000 UTC to 2028-03-17 09:54:53 +0000 UTC (now=2026-03-18 09:57:34.272158057 +0000 UTC))" 2026-03-18T09:57:34.272337042Z I0318 09:57:34.272315 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827854\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827853\" (2026-03-18 08:57:33 +0000 UTC to 2029-03-18 08:57:33 +0000 UTC (now=2026-03-18 09:57:34.272305981 +0000 UTC))" 2026-03-18T09:57:34.281566537Z I0318 09:57:34.280874 1 leaderelection.go:268] successfully acquired lease openshift-kube-scheduler/kube-scheduler 2026-03-18T09:57:34.281566537Z I0318 09:57:34.281212 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7dcf5569b5-82tbk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T09:57:34.281706831Z I0318 09:57:34.281667 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-4wcqx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T09:57:34.281776432Z I0318 09:57:34.281736 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-4kpnv" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T09:57:34.293467328Z I0318 09:57:34.292127 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-nzqck" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:34.293467328Z I0318 09:57:34.292283 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-8w5rc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:34.293467328Z I0318 09:57:34.293387 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-pdfn6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:34.293717754Z I0318 09:57:34.293537 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-jl7c8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:51.971272799Z I0318 09:57:51.967390 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77-rtnkl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:51.971272799Z I0318 09:57:51.967668 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-6cb57bb5db-wk759" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:51.971272799Z I0318 09:57:51.967843 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c-tntvw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:51.971272799Z I0318 09:57:51.967995 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78-5dg2r" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:52.090618175Z I0318 09:57:52.088319 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6-4kr54" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:52.170875325Z I0318 09:57:52.170620 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-68bf6ff9d6-bdcw7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:52.170971798Z I0318 09:57:52.170922 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-zcm5j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:52.219261787Z I0318 09:57:52.219209 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-866dc4744-mw9tt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:52.277975681Z I0318 09:57:52.277923 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-6fbb6cf6f9-xnvn9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:52.278514744Z I0318 09:57:52.278493 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-6f69995874-lnq7l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:52.457301462Z I0318 09:57:52.457085 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-84d549f6d5-gnl5t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:52.496021278Z I0318 09:57:52.495969 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-7b64dcc66c-2vx58" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:57:59.306045945Z I0318 09:57:59.305642 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-mtdk2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:58:20.045678285Z I0318 09:58:20.045139 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856-rpxn4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:58:20.082341821Z I0318 09:58:20.082122 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-5c6485487f-95jvh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:58:21.994237337Z I0318 09:58:21.989445 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-b4f87c5b9-rslmx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:58:23.054137631Z I0318 09:58:23.054038 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-4wcqx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:58:23.059384869Z I0318 09:58:23.059244 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-7dcf5569b5-82tbk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:58:23.060019334Z I0318 09:58:23.059433 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-4kpnv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:58:23.083264192Z I0318 09:58:23.082706 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-canary/ingress-canary-rzksb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:58:27.426270690Z I0318 09:58:27.421989 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-9wnkm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T09:58:28.172419648Z I0318 09:58:28.170428 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-6c8df6d4b-886k6" node="master-0" evaluatedNodes=1 feasibleNodes=1 wait-for-host-port_current.log0000640000000000000000000000010615156473531033341 0ustar0000000000000000config/pod/openshift-kube-scheduler/logs/openshift-kube-scheduler-master-02026-03-18T09:57:33.074936299Z Waiting for port :10259 to be released.config/pod/openshift-kube-scheduler/logs/installer-4-master-0/installer_current.log0000640000000000000000000006564215156473531027207 0ustar00000000000000002026-03-18T09:56:57.300512397Z I0318 09:56:57.299632 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000aea500 cert-secrets:0xc000aea280 configmaps:0xc000aadd60 namespace:0xc000aadb80 optional-configmaps:0xc000aadea0 optional-secrets:0xc000aade00 pod:0xc000aadc20 pod-manifest-dir:0xc000aea0a0 resource-dir:0xc000aea000 revision:0xc000aadae0 secrets:0xc000aadcc0 v:0xc000aeaf00] [0xc000aeaf00 0xc000aadae0 0xc000aadb80 0xc000aadc20 0xc000aea000 0xc000aea0a0 0xc000aadd60 0xc000aadea0 0xc000aade00 0xc000aadcc0 0xc000aea500 0xc000aea280] [] map[cert-configmaps:0xc000aea320 cert-dir:0xc000aea500 cert-secrets:0xc000aea280 configmaps:0xc000aadd60 help:0xc000aeb2c0 kubeconfig:0xc000aada40 log-flush-frequency:0xc000aeae60 namespace:0xc000aadb80 optional-cert-configmaps:0xc000aea460 optional-cert-secrets:0xc000aea3c0 optional-configmaps:0xc000aadea0 optional-secrets:0xc000aade00 pod:0xc000aadc20 pod-manifest-dir:0xc000aea0a0 pod-manifests-lock-file:0xc000aea1e0 resource-dir:0xc000aea000 revision:0xc000aadae0 secrets:0xc000aadcc0 timeout-duration:0xc000aea140 v:0xc000aeaf00 vmodule:0xc000aeafa0] [0xc000aada40 0xc000aadae0 0xc000aadb80 0xc000aadc20 0xc000aadcc0 0xc000aadd60 0xc000aade00 0xc000aadea0 0xc000aea000 0xc000aea0a0 0xc000aea140 0xc000aea1e0 0xc000aea280 0xc000aea320 0xc000aea3c0 0xc000aea460 0xc000aea500 0xc000aeae60 0xc000aeaf00 0xc000aeafa0 0xc000aeb2c0] [0xc000aea320 0xc000aea500 0xc000aea280 0xc000aadd60 0xc000aeb2c0 0xc000aada40 0xc000aeae60 0xc000aadb80 0xc000aea460 0xc000aea3c0 0xc000aadea0 0xc000aade00 0xc000aadc20 0xc000aea0a0 0xc000aea1e0 0xc000aea000 0xc000aadae0 0xc000aadcc0 0xc000aea140 0xc000aeaf00 0xc000aeafa0] map[104:0xc000aeb2c0 118:0xc000aeaf00] [] -1 0 0xc000ade7e0 true 0x223dac0 []} 2026-03-18T09:56:57.300512397Z I0318 09:56:57.299952 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00073d860)({ 2026-03-18T09:56:57.300512397Z KubeConfig: (string) "", 2026-03-18T09:56:57.300512397Z KubeClient: (kubernetes.Interface) , 2026-03-18T09:56:57.300512397Z Revision: (string) (len=1) "4", 2026-03-18T09:56:57.300512397Z NodeName: (string) "", 2026-03-18T09:56:57.300512397Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-18T09:56:57.300512397Z Clock: (clock.RealClock) { 2026-03-18T09:56:57.300512397Z }, 2026-03-18T09:56:57.300512397Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-18T09:56:57.300512397Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T09:56:57.300512397Z (string) (len=31) "localhost-recovery-client-token" 2026-03-18T09:56:57.300512397Z }, 2026-03-18T09:56:57.300512397Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T09:56:57.300512397Z (string) (len=12) "serving-cert" 2026-03-18T09:56:57.300512397Z }, 2026-03-18T09:56:57.300512397Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-18T09:56:57.300512397Z (string) (len=18) "kube-scheduler-pod", 2026-03-18T09:56:57.300512397Z (string) (len=6) "config", 2026-03-18T09:56:57.300512397Z (string) (len=17) "serviceaccount-ca", 2026-03-18T09:56:57.300512397Z (string) (len=20) "scheduler-kubeconfig", 2026-03-18T09:56:57.300512397Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-18T09:56:57.300512397Z }, 2026-03-18T09:56:57.300512397Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T09:56:57.300512397Z (string) (len=16) "policy-configmap" 2026-03-18T09:56:57.300512397Z }, 2026-03-18T09:56:57.300512397Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-18T09:56:57.300512397Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-18T09:56:57.300512397Z }, 2026-03-18T09:56:57.300512397Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-18T09:56:57.300512397Z CertConfigMapNamePrefixes: ([]string) , 2026-03-18T09:56:57.300512397Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-18T09:56:57.300512397Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-18T09:56:57.300512397Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T09:56:57.300512397Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T09:56:57.300512397Z Timeout: (time.Duration) 2m0s, 2026-03-18T09:56:57.300512397Z StaticPodManifestsLockFile: (string) "", 2026-03-18T09:56:57.300512397Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T09:56:57.300512397Z KubeletVersion: (string) "" 2026-03-18T09:56:57.300512397Z }) 2026-03-18T09:56:57.304511756Z I0318 09:56:57.301257 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T09:56:57.395471966Z I0318 09:56:57.395397 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T09:56:57.395514577Z I0318 09:56:57.395476 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T09:56:57.395514577Z I0318 09:56:57.395488 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T09:56:57.401925746Z I0318 09:56:57.400458 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-18T09:57:27.400663319Z I0318 09:57:27.400589 1 cmd.go:524] Getting installer pods for node master-0 2026-03-18T09:57:27.406670876Z I0318 09:57:27.406607 1 cmd.go:542] Latest installer revision for node master-0 is: 4 2026-03-18T09:57:27.406670876Z I0318 09:57:27.406628 1 cmd.go:431] Querying kubelet version for node master-0 2026-03-18T09:57:27.410238373Z I0318 09:57:27.410179 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-03-18T09:57:27.410264343Z I0318 09:57:27.410234 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4" ... 2026-03-18T09:57:27.410500969Z I0318 09:57:27.410454 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4" ... 2026-03-18T09:57:27.410500969Z I0318 09:57:27.410489 1 cmd.go:229] Getting secrets ... 2026-03-18T09:57:27.413567314Z I0318 09:57:27.413498 1 copy.go:32] Got secret openshift-kube-scheduler/localhost-recovery-client-token-4 2026-03-18T09:57:27.416170098Z I0318 09:57:27.416101 1 copy.go:32] Got secret openshift-kube-scheduler/serving-cert-4 2026-03-18T09:57:27.416198848Z I0318 09:57:27.416165 1 cmd.go:242] Getting config maps ... 2026-03-18T09:57:29.560171385Z I0318 09:57:29.560115 1 copy.go:60] Got configMap openshift-kube-scheduler/config-4 2026-03-18T09:57:29.577253863Z I0318 09:57:29.575220 1 copy.go:60] Got configMap openshift-kube-scheduler/kube-scheduler-cert-syncer-kubeconfig-4 2026-03-18T09:57:29.601974696Z I0318 09:57:29.597220 1 copy.go:60] Got configMap openshift-kube-scheduler/kube-scheduler-pod-4 2026-03-18T09:57:29.613196391Z I0318 09:57:29.611590 1 copy.go:60] Got configMap openshift-kube-scheduler/scheduler-kubeconfig-4 2026-03-18T09:57:29.626261190Z I0318 09:57:29.622520 1 copy.go:60] Got configMap openshift-kube-scheduler/serviceaccount-ca-4 2026-03-18T09:57:29.634382618Z I0318 09:57:29.628367 1 copy.go:52] Failed to get config map openshift-kube-scheduler/policy-configmap-4: configmaps "policy-configmap-4" not found 2026-03-18T09:57:29.634382618Z I0318 09:57:29.628408 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/localhost-recovery-client-token" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.628634 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/localhost-recovery-client-token/ca.crt" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.628915 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/localhost-recovery-client-token/namespace" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.629079 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/localhost-recovery-client-token/token" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.629423 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/serving-cert" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.629519 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/serving-cert/tls.crt" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.629678 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/secrets/serving-cert/tls.key" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.629889 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/config" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.630411 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/config/config.yaml" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.630621 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-cert-syncer-kubeconfig" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.630711 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.630902 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-pod" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.630996 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-pod/pod.yaml" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.631157 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-pod/version" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.631301 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/kube-scheduler-pod/forceRedeploymentReason" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.631437 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/scheduler-kubeconfig" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.631518 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/scheduler-kubeconfig/kubeconfig" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.631669 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/serviceaccount-ca" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.631788 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.631978 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-certs" ... 2026-03-18T09:57:29.634382618Z I0318 09:57:29.632065 1 cmd.go:229] Getting secrets ... 2026-03-18T09:57:29.659868241Z I0318 09:57:29.655938 1 copy.go:32] Got secret openshift-kube-scheduler/kube-scheduler-client-cert-key 2026-03-18T09:57:29.659868241Z I0318 09:57:29.655974 1 cmd.go:242] Getting config maps ... 2026-03-18T09:57:29.659868241Z I0318 09:57:29.656003 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key" ... 2026-03-18T09:57:29.659868241Z I0318 09:57:29.656201 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key/tls.crt" ... 2026-03-18T09:57:29.659868241Z I0318 09:57:29.656359 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key/tls.key" ... 2026-03-18T09:57:29.659868241Z I0318 09:57:29.656503 1 cmd.go:335] Getting pod configmaps/kube-scheduler-pod-4 -n openshift-kube-scheduler 2026-03-18T09:57:29.664953505Z I0318 09:57:29.664912 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-03-18T09:57:29.664996666Z I0318 09:57:29.664949 1 cmd.go:379] Writing a pod under "kube-scheduler-pod.yaml" key 2026-03-18T09:57:29.664996666Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"openshift-kube-scheduler","namespace":"openshift-kube-scheduler","creationTimestamp":null,"labels":{"app":"openshift-kube-scheduler","revision":"4","scheduler":"true"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-scheduler","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-certs"}}],"initContainers":[{"name":"wait-for-host-port","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["/usr/bin/timeout","30","/bin/bash","-c"],"args":["echo -n \"Waiting for port :10259 to be released.\"\nwhile [ -n \"$(ss -Htan '( sport = 10259 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["hyperkube","kube-scheduler"],"args":["--config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--feature-gates=AWSClusterHostedDNS=false,AWSEFSDriverVolumeMetrics=true,AdditionalRoutingCapabilities=false,AdminNetworkPolicy=true,AlibabaPlatform=true,AutomatedEtcdBackup=false,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BootcNodeManagement=false,BuildCSIVolumes=true,CSIDriverSharedResource=false,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DisableKubeletCloudCredentialProviders=true,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GCPLabelsTags=true,GatewayAPI=false,HardwareSpeed=true,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,IngressControllerLBSubnetsAWS=true,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,KMSv1=true,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,ManagedBootImages=true,ManagedBootImagesAWS=true,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAWS=true,MultiArchInstallAzure=false,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OnClusterBuild=true,OpenShiftPodSecurityAdmission=false,PersistentIPsForVirtualization=true,PinnedImages=false,PlatformOperators=false,PrivateHostedZoneAWS=true,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SetEIPForNLBIngressController=true,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiNetworks=false,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,VolumeAttributesClass=false,VolumeGroupSnapshot=false","-v=2","--tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt","--tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"ports":[{"containerPort":10259}],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"readinessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 11443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:11443 -v=2\n"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-18T09:57:29.670680235Z I0318 09:57:29.670621 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4/kube-scheduler-pod.yaml" ... 2026-03-18T09:57:29.670935831Z I0318 09:57:29.670866 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-scheduler-pod.yaml" ... 2026-03-18T09:57:29.670935831Z I0318 09:57:29.670882 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-scheduler-pod.yaml" ... 2026-03-18T09:57:29.670935831Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"openshift-kube-scheduler","namespace":"openshift-kube-scheduler","creationTimestamp":null,"labels":{"app":"openshift-kube-scheduler","revision":"4","scheduler":"true"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-scheduler","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-certs"}}],"initContainers":[{"name":"wait-for-host-port","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["/usr/bin/timeout","30","/bin/bash","-c"],"args":["echo -n \"Waiting for port :10259 to be released.\"\nwhile [ -n \"$(ss -Htan '( sport = 10259 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["hyperkube","kube-scheduler"],"args":["--config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--feature-gates=AWSClusterHostedDNS=false,AWSEFSDriverVolumeMetrics=true,AdditionalRoutingCapabilities=false,AdminNetworkPolicy=true,AlibabaPlatform=true,AutomatedEtcdBackup=false,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BootcNodeManagement=false,BuildCSIVolumes=true,CSIDriverSharedResource=false,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DisableKubeletCloudCredentialProviders=true,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GCPLabelsTags=true,GatewayAPI=false,HardwareSpeed=true,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,IngressControllerLBSubnetsAWS=true,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,KMSv1=true,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,ManagedBootImages=true,ManagedBootImagesAWS=true,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAWS=true,MultiArchInstallAzure=false,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OnClusterBuild=true,OpenShiftPodSecurityAdmission=false,PersistentIPsForVirtualization=true,PinnedImages=false,PlatformOperators=false,PrivateHostedZoneAWS=true,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SetEIPForNLBIngressController=true,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiNetworks=false,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,VolumeAttributesClass=false,VolumeGroupSnapshot=false","-v=2","--tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt","--tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"ports":[{"containerPort":10259}],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"readinessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 11443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:11443 -v=2\n"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} kube-controller-manager-operator_current.log0000640000000000000000000001020415156473531044454 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-pzqqc2026-03-18T09:57:45.017016230Z I0318 09:57:45.014114 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:57:45.017016230Z I0318 09:57:45.014211 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:57:45.017016230Z I0318 09:57:45.014574 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:45.032724363Z I0318 09:57:45.032651 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-18T09:57:45.464087641Z I0318 09:57:45.464023 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T09:57:45.464087641Z W0318 09:57:45.464048 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:45.464087641Z W0318 09:57:45.464052 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:45.464087641Z W0318 09:57:45.464056 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T09:57:45.464087641Z W0318 09:57:45.464060 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T09:57:45.464087641Z W0318 09:57:45.464062 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T09:57:45.464087641Z W0318 09:57:45.464065 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T09:57:45.468841077Z I0318 09:57:45.468785 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T09:57:45.468841077Z I0318 09:57:45.468818 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T09:57:45.468860597Z I0318 09:57:45.468814 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T09:57:45.468868467Z I0318 09:57:45.468861 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:45.468929939Z I0318 09:57:45.468893 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T09:57:45.468937369Z I0318 09:57:45.468931 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:45.469214726Z I0318 09:57:45.469181 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T09:57:45.469214726Z I0318 09:57:45.469200 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T09:57:45.469263297Z I0318 09:57:45.469233 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T09:57:45.469297948Z I0318 09:57:45.469276 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T09:57:45.469518633Z I0318 09:57:45.469491 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-03-18T09:57:45.569507286Z I0318 09:57:45.569424 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:45.569507286Z I0318 09:57:45.569438 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T09:57:45.569589038Z I0318 09:57:45.569521 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-controller-manager-operator_previous.log0000640000000000000000000000162115156473531044651 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-pzqqc2026-03-18T09:56:56.338123020Z I0318 09:56:56.331928 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:56:56.338123020Z I0318 09:56:56.332054 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:56:56.338123020Z I0318 09:56:56.333616 1 observer_polling.go:159] Starting file observer 2026-03-18T09:56:56.386223780Z I0318 09:56:56.386175 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-18T09:57:29.564875030Z F0318 09:57:29.564797 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded kube-controller-manager-operator-ff989d6cc-pzqqc.json0000640000000000000000000001611315156473531033573 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-ff989d6cc-pzqqc","generateName":"kube-controller-manager-operator-ff989d6cc-","namespace":"openshift-kube-controller-manager-operator","uid":"0999f781-3299-4cb6-ba76-2a4f4584c685","resourceVersion":"10334","creationTimestamp":"2026-03-18T09:52:38Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"ff989d6cc"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.16/23\"],\"mac_address\":\"0a:58:0a:80:00:10\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.16/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.16\"\n ],\n \"mac\": \"0a:58:0a:80:00:10\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-ff989d6cc","uid":"05f94a27-ed67-4743-82e6-c0377b261b08","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67c988e079558dc6b20232ebf9a7f7276fee60c756caed584c9715e0bec77a5a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:41Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:45Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:45Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.16","podIPs":[{"ip":"10.128.0.16"}],"startTime":"2026-03-18T09:54:21Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-18T09:57:44Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 09:56:56.331928 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 09:56:56.332054 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 09:56:56.333616 1 observer_polling.go:159] Starting file observer\nI0318 09:56:56.386175 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0\nF0318 09:57:29.564797 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-03-18T09:56:56Z","finishedAt":"2026-03-18T09:57:29Z","containerID":"cri-o://bd5fe04a9ede0b84f18ed45bdc7555eb6593622c877cdf75babe4d3ead617eed"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","containerID":"cri-o://bdf23e456932d75fae6cdcf4a2bdaca513da90b17853bb40022bebbd243e87d8","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-controller-manager-recovery-controller_current.log0000640000000000000000000004412615156473531042057 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T09:57:35.171576529Z + timeout 3m /bin/bash -exuo pipefail -c 'while [ -n "$(ss -Htanop \( sport = 9443 \))" ]; do sleep 1; done' 2026-03-18T09:57:35.175527106Z ++ ss -Htanop '(' sport = 9443 ')' 2026-03-18T09:57:35.185898909Z + '[' -n '' ']' 2026-03-18T09:57:35.186692428Z + exec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=openshift-kube-controller-manager --listen=0.0.0.0:9443 -v=2 2026-03-18T09:57:35.244550182Z W0318 09:57:35.244389 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-18T09:57:35.244744776Z I0318 09:57:35.244719 1 crypto.go:601] Generating new CA for cert-recovery-controller-signer@1773827855 cert, and key in /tmp/serving-cert-2941128245/serving-signer.crt, /tmp/serving-cert-2941128245/serving-signer.key 2026-03-18T09:57:35.558873881Z I0318 09:57:35.553417 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:57:35.558873881Z I0318 09:57:35.554324 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T09:57:35.558873881Z I0318 09:57:35.554335 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T09:57:35.559066885Z I0318 09:57:35.559027 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:35.573324094Z W0318 09:57:35.573249 1 builder.go:272] unable to get owner reference (falling back to namespace): Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/pods": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:35.573400616Z I0318 09:57:35.573366 1 builder.go:304] cert-recovery-controller version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-18T09:57:35.577055115Z W0318 09:57:35.576939 1 builder.go:364] unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:35.577184718Z I0318 09:57:35.577148 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager/cert-recovery-controller-lock... 2026-03-18T09:57:35.577808073Z I0318 09:57:35.577768 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-controller-manager", Name:"openshift-kube-controller-manager", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ControlPlaneTopology' unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:35.580697904Z E0318 09:57:35.579811 1 leaderelection.go:436] error retrieving resource lock openshift-kube-controller-manager/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:35.581691528Z E0318 09:57:35.581648 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189de709585ae81a openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,LastTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:57:36.367771882Z E0318 09:57:36.367725 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189de709585ae81a openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,LastTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:57:46.378370606Z E0318 09:57:46.378298 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189de709585ae81a openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,LastTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:57:56.390407556Z E0318 09:57:56.390331 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189de709585ae81a openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,LastTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:58:06.394306538Z E0318 09:58:06.394218 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189de709585ae81a openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,LastTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:58:08.837506614Z E0318 09:58:08.837272 1 leaderelection.go:436] error retrieving resource lock openshift-kube-controller-manager/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:58:16.398180389Z E0318 09:58:16.398125 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189de709585ae81a openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,LastTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:58:26.404701113Z E0318 09:58:26.404630 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189de709585ae81a openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,LastTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T09:58:36.409223009Z E0318 09:58:36.409165 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189de709585ae81a openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,LastTimestamp:2026-03-18 09:57:35.576918042 +0000 UTC m=+0.385251043,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" kube-controller-manager-cert-syncer_current.log0000640000000000000000000003362515156473531040300 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T09:57:34.974669249Z I0318 09:57:34.974498 1 base_controller.go:76] Waiting for caches to sync for CertSyncController 2026-03-18T09:57:34.974797372Z I0318 09:57:34.974689 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:34.978124733Z W0318 09:57:34.978042 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:34.978150674Z E0318 09:57:34.978127 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:34.979055616Z W0318 09:57:34.978993 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:34.979055616Z E0318 09:57:34.979050 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:36.088627293Z W0318 09:57:36.088535 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:36.088627293Z E0318 09:57:36.088603 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:36.114925805Z W0318 09:57:36.114839 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:36.114925805Z E0318 09:57:36.114898 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:37.916388214Z W0318 09:57:37.916273 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:37.916425115Z E0318 09:57:37.916400 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:38.006502705Z W0318 09:57:38.006398 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:38.006502705Z E0318 09:57:38.006471 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:42.295153805Z W0318 09:57:42.293745 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:42.295153805Z E0318 09:57:42.293795 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:44.098472100Z W0318 09:57:44.098400 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:44.098496530Z E0318 09:57:44.098468 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:54.566890389Z W0318 09:57:54.566681 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:54.566890389Z E0318 09:57:54.566744 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:57:55.657531623Z W0318 09:57:55.657481 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:57:55.657625935Z E0318 09:57:55.657613 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:58:10.576105277Z W0318 09:58:10.576000 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:58:10.576105277Z E0318 09:58:10.576077 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T09:58:12.918442450Z W0318 09:58:12.918353 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T09:58:12.918487491Z E0318 09:58:12.918455 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" cluster-policy-controller_current.log0000640000000000000000000005314715156473531036465 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T09:57:35.617571335Z I0318 09:57:35.617549 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:tokenreview-openshift-route-controller-manager" not found 2026-03-18T09:57:35.617571335Z I0318 09:57:35.617555 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:useroauthaccesstoken-manager" not found 2026-03-18T09:57:35.617571335Z I0318 09:57:35.617564 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:public-info-viewer" not found 2026-03-18T09:57:35.617581515Z I0318 09:57:35.617569 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:scope-impersonation" not found 2026-03-18T09:57:35.617581515Z I0318 09:57:35.617574 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:sdn-reader" not found 2026-03-18T09:57:35.617589175Z I0318 09:57:35.617579 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:service-account-issuer-discovery" not found 2026-03-18T09:57:35.617589175Z I0318 09:57:35.617584 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:volume-scheduler" not found 2026-03-18T09:57:35.617603305Z I0318 09:57:35.617588 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:webhook" not found 2026-03-18T09:57:35.618946718Z I0318 09:57:35.618922 1 reflector.go:368] Caches populated for *v1.ClusterRole from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:35.624711569Z I0318 09:57:35.624667 1 reflector.go:368] Caches populated for *v1.RoleBinding from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:35.626541364Z E0318 09:57:35.626514 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-image-registry" should be enqueued: namespace "openshift-image-registry" not found 2026-03-18T09:57:35.627366794Z E0318 09:57:35.627307 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-machine-api" should be enqueued: namespace "openshift-machine-api" not found 2026-03-18T09:57:35.627537498Z I0318 09:57:35.627516 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "monitoring-alertmanager-edit" not found 2026-03-18T09:57:35.627729053Z E0318 09:57:35.627707 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-network-node-identity" should be enqueued: namespace "openshift-network-node-identity" not found 2026-03-18T09:57:35.628360168Z E0318 09:57:35.628320 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-18T09:57:35.632433598Z I0318 09:57:35.632391 1 base_controller.go:74] Caches are synced for WebhookAuthenticatorCertApprover_csr-approver-controller 2026-03-18T09:57:35.632433598Z I0318 09:57:35.632420 1 base_controller.go:111] Starting #1 worker of WebhookAuthenticatorCertApprover_csr-approver-controller controller ... 2026-03-18T09:57:35.674164347Z I0318 09:57:35.674098 1 reflector.go:368] Caches populated for *v1.LimitRange from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:35.751642760Z I0318 09:57:35.750869 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:35.874050770Z I0318 09:57:35.873988 1 reflector.go:368] Caches populated for *v1.PodTemplate from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:35.951529173Z I0318 09:57:35.951469 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:36.150537735Z I0318 09:57:36.150480 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:36.274810531Z I0318 09:57:36.274736 1 reflector.go:368] Caches populated for *v1.ResourceQuota from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:36.293850206Z I0318 09:57:36.293774 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:36.351969606Z I0318 09:57:36.351890 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:36.486494942Z I0318 09:57:36.486431 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:36.554910134Z I0318 09:57:36.553066 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:36.672004404Z I0318 09:57:36.671927 1 request.go:700] Waited for 1.124173384s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/api/v1/namespaces?limit=500&resourceVersion=0 2026-03-18T09:57:36.682793668Z I0318 09:57:36.682726 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:36.746623367Z I0318 09:57:36.746536 1 shared_informer.go:320] Caches are synced for privileged-namespaces-psa-label-syncer 2026-03-18T09:57:36.751563018Z I0318 09:57:36.751491 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:36.776424795Z I0318 09:57:36.776342 1 base_controller.go:74] Caches are synced for namespace-security-allocation-controller 2026-03-18T09:57:36.776424795Z I0318 09:57:36.776378 1 base_controller.go:111] Starting #1 worker of namespace-security-allocation-controller controller ... 2026-03-18T09:57:36.776478437Z I0318 09:57:36.776421 1 namespace_scc_allocation_controller.go:111] Repairing SCC UID Allocations 2026-03-18T09:57:36.802066112Z W0318 09:57:36.802002 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-18T09:57:36.802113163Z E0318 09:57:36.802064 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-18T09:57:36.874599974Z I0318 09:57:36.874369 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:36.956995726Z I0318 09:57:36.952298 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:37.151463527Z I0318 09:57:37.151312 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:37.175662039Z I0318 09:57:37.175596 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:37.274072853Z I0318 09:57:37.274024 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:37.351124555Z I0318 09:57:37.351066 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:37.527516374Z I0318 09:57:37.526637 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:37.551861899Z I0318 09:57:37.551772 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:37.698448060Z I0318 09:57:37.698312 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:37.750095692Z I0318 09:57:37.750029 1 request.go:700] Waited for 2.199950304s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/network.operator.openshift.io/v1/egressrouters?limit=500&resourceVersion=0 2026-03-18T09:57:37.751753572Z I0318 09:57:37.751713 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:37.780236378Z I0318 09:57:37.780103 1 base_controller.go:74] Caches are synced for pod-security-admission-label-synchronization-controller 2026-03-18T09:57:37.780236378Z I0318 09:57:37.780133 1 base_controller.go:111] Starting #1 worker of pod-security-admission-label-synchronization-controller controller ... 2026-03-18T09:57:37.878785756Z I0318 09:57:37.878738 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:37.951866870Z I0318 09:57:37.951129 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:38.151535008Z I0318 09:57:38.151453 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:38.328026870Z I0318 09:57:38.327868 1 namespace_scc_allocation_controller.go:116] Repair complete 2026-03-18T09:57:38.352345734Z I0318 09:57:38.352276 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:38.551596091Z I0318 09:57:38.551536 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:38.752056089Z I0318 09:57:38.752012 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:38.950069526Z I0318 09:57:38.950000 1 request.go:700] Waited for 3.399754334s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/operators.coreos.com/v1alpha1/catalogsources?limit=500&resourceVersion=0 2026-03-18T09:57:38.953534541Z I0318 09:57:38.953482 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:39.054194590Z W0318 09:57:39.054128 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-18T09:57:39.054194590Z E0318 09:57:39.054171 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-18T09:57:39.152117222Z I0318 09:57:39.152041 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:39.353080682Z I0318 09:57:39.353000 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:39.551337045Z I0318 09:57:39.551270 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:39.752610792Z I0318 09:57:39.751471 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:39.951035069Z I0318 09:57:39.950973 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:40.150877822Z I0318 09:57:40.149228 1 request.go:700] Waited for 4.598815727s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/authorization.openshift.io/v1/rolebindingrestrictions?limit=500&resourceVersion=0 2026-03-18T09:57:40.150877822Z I0318 09:57:40.150763 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:40.350702853Z I0318 09:57:40.350637 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:40.552462142Z I0318 09:57:40.552077 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:40.751183407Z I0318 09:57:40.751105 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:40.951141662Z I0318 09:57:40.951079 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:41.149940539Z I0318 09:57:41.149875 1 request.go:700] Waited for 5.599317149s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/cloudcredential.openshift.io/v1/credentialsrequests?limit=500&resourceVersion=0 2026-03-18T09:57:41.153452454Z I0318 09:57:41.153413 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:41.352595699Z I0318 09:57:41.352486 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:41.552077342Z I0318 09:57:41.551986 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:41.751656647Z I0318 09:57:41.751576 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:41.950680620Z I0318 09:57:41.950516 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:42.150253245Z I0318 09:57:42.150176 1 request.go:700] Waited for 6.599448682s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/monitoring.coreos.com/v1/prometheuses?limit=500&resourceVersion=0 2026-03-18T09:57:42.151794553Z I0318 09:57:42.151721 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:42.350859366Z I0318 09:57:42.350592 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:42.550744519Z I0318 09:57:42.550605 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:42.756935796Z I0318 09:57:42.754956 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:42.953311444Z I0318 09:57:42.953238 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:43.151298680Z I0318 09:57:43.151245 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:43.349925013Z I0318 09:57:43.349860 1 request.go:700] Waited for 7.798877404s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/whereabouts.cni.cncf.io/v1alpha1/nodeslicepools?limit=500&resourceVersion=0 2026-03-18T09:57:43.351298846Z I0318 09:57:43.351255 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:43.551489837Z I0318 09:57:43.551419 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:43.751155675Z I0318 09:57:43.751083 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:43.951134220Z I0318 09:57:43.950243 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:44.150837749Z I0318 09:57:44.150735 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T09:57:44.153980866Z I0318 09:57:44.153939 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-18T09:57:44.228222250Z I0318 09:57:44.228125 1 reconciliation_controller.go:149] Caches are synced 2026-03-18T09:57:44.672873762Z W0318 09:57:44.671398 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-03-18T09:57:44.672873762Z E0318 09:57:44.671444 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-03-18T09:57:54.279596740Z W0318 09:57:54.279547 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T09:57:54.279637641Z E0318 09:57:54.279592 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T09:58:10.775572410Z W0318 09:58:10.775509 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T09:58:10.775608301Z E0318 09:58:10.775566 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T09:58:14.161441605Z I0318 09:58:14.161367 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1 2026-03-18T09:58:14.161546108Z E0318 09:58:14.161531 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1" kube-controller-manager_current.log0000640000000000000000000006317015156473531036042 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T09:57:53.924355192Z I0318 09:57:53.923658 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8" duration="43.891µs" 2026-03-18T09:57:53.941653994Z I0318 09:57:53.941592 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="60.381µs" 2026-03-18T09:57:55.837856508Z I0318 09:57:55.837739 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7b64dcc66c" duration="44.381µs" 2026-03-18T09:57:55.840027042Z I0318 09:57:55.838039 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84d549f6d5" duration="22.801µs" 2026-03-18T09:57:56.783938970Z I0318 09:57:56.783663 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7b64dcc66c" duration="55.231µs" 2026-03-18T09:57:56.820988395Z I0318 09:57:56.820927 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7b64dcc66c" duration="9.754378ms" 2026-03-18T09:57:56.821118028Z I0318 09:57:56.821096 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7b64dcc66c" duration="26.911µs" 2026-03-18T09:57:59.182393584Z I0318 09:57:59.181856 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84d549f6d5" duration="14.234178ms" 2026-03-18T09:57:59.182393584Z I0318 09:57:59.182092 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84d549f6d5" duration="123.283µs" 2026-03-18T09:58:05.837138137Z I0318 09:58:05.836996 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" need=0 deleting=1 2026-03-18T09:58:05.837138137Z I0318 09:58:05.837069 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" relatedReplicaSets=["openshift-cluster-machine-approver/machine-approver-6cb57bb5db"] 2026-03-18T09:58:05.837214629Z I0318 09:58:05.837141 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="machine-approver-6cb57bb5db" pod="openshift-cluster-machine-approver/machine-approver-6cb57bb5db-wk759" 2026-03-18T09:58:11.444619425Z I0318 09:58:11.441628 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" duration="5.604684129s" 2026-03-18T09:58:11.483471344Z I0318 09:58:11.483153 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" duration="41.470723ms" 2026-03-18T09:58:11.483471344Z I0318 09:58:11.483232 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" duration="35.281µs" 2026-03-18T09:58:13.598966685Z I0318 09:58:13.596364 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" need=0 deleting=1 2026-03-18T09:58:13.598966685Z I0318 09:58:13.596397 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" relatedReplicaSets=["openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c"] 2026-03-18T09:58:13.598966685Z I0318 09:58:13.596423 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="cluster-cloud-controller-manager-operator-7559f7c68c" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c-tntvw" 2026-03-18T09:58:13.614866464Z I0318 09:58:13.614779 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="18.44332ms" 2026-03-18T09:58:13.625167945Z I0318 09:58:13.625109 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="10.287502ms" 2026-03-18T09:58:13.625344650Z I0318 09:58:13.625313 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="33.611µs" 2026-03-18T09:58:13.625886663Z I0318 09:58:13.625844 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T09:58:18.969869404Z I0318 09:58:18.969787 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6" duration="15.922929ms" 2026-03-18T09:58:18.969940025Z I0318 09:58:18.969924 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6" duration="63.052µs" 2026-03-18T09:58:19.077274458Z I0318 09:58:19.074730 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="13.50034ms" 2026-03-18T09:58:19.077274458Z I0318 09:58:19.074850 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="78.972µs" 2026-03-18T09:58:19.088336078Z I0318 09:58:19.087776 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="57.842µs" 2026-03-18T09:58:19.124736647Z I0318 09:58:19.124679 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77" duration="11.448299ms" 2026-03-18T09:58:19.124792438Z I0318 09:58:19.124738 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77" duration="26.271µs" 2026-03-18T09:58:19.143274060Z I0318 09:58:19.142490 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" duration="57.061µs" 2026-03-18T09:58:19.165454852Z I0318 09:58:19.165392 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8" duration="10.111287ms" 2026-03-18T09:58:19.165516493Z I0318 09:58:19.165498 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8" duration="54.352µs" 2026-03-18T09:58:19.184983459Z I0318 09:58:19.184227 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="11.631304ms" 2026-03-18T09:58:19.184983459Z I0318 09:58:19.184291 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="39.451µs" 2026-03-18T09:58:19.248594323Z I0318 09:58:19.248529 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-6f69995874" duration="41.413732ms" 2026-03-18T09:58:19.253517073Z I0318 09:58:19.249975 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-6f69995874" duration="52.411µs" 2026-03-18T09:58:19.264944192Z I0318 09:58:19.264891 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-866dc4744" duration="13.715215ms" 2026-03-18T09:58:19.264977443Z I0318 09:58:19.264942 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-866dc4744" duration="24.98µs" 2026-03-18T09:58:19.296163155Z I0318 09:58:19.296106 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78" duration="16.770809ms" 2026-03-18T09:58:19.296221526Z I0318 09:58:19.296200 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78" duration="55.802µs" 2026-03-18T09:58:19.314324859Z I0318 09:58:19.314274 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" duration="728.068µs" 2026-03-18T09:58:19.334913522Z I0318 09:58:19.334575 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="52.751µs" 2026-03-18T09:58:19.997925159Z I0318 09:58:19.996433 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="54.401µs" 2026-03-18T09:58:20.000483981Z I0318 09:58:20.000433 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="27.211µs" 2026-03-18T09:58:20.018345018Z I0318 09:58:20.018274 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" duration="56.962µs" 2026-03-18T09:58:20.020054179Z I0318 09:58:20.019984 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" need=1 creating=1 2026-03-18T09:58:20.032481513Z I0318 09:58:20.032414 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-6cb57bb5db" duration="51.691µs" 2026-03-18T09:58:20.040217132Z I0318 09:58:20.040147 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T09:58:20.051349564Z I0318 09:58:20.047114 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="27.166123ms" 2026-03-18T09:58:20.058111009Z I0318 09:58:20.056617 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-5c6485487f" need=1 creating=1 2026-03-18T09:58:20.067221572Z I0318 09:58:20.067177 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="20.003428ms" 2026-03-18T09:58:20.067279083Z I0318 09:58:20.067257 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="34.511µs" 2026-03-18T09:58:20.082480084Z I0318 09:58:20.082436 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="25.857232ms" 2026-03-18T09:58:20.082660159Z I0318 09:58:20.082622 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cluster-machine-approver/machine-approver" err="Operation cannot be fulfilled on deployments.apps \"machine-approver\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T09:58:20.106311107Z I0318 09:58:20.106111 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="85.872µs" 2026-03-18T09:58:20.114692011Z I0318 09:58:20.114633 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="32.138836ms" 2026-03-18T09:58:20.114789454Z I0318 09:58:20.114767 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="86.102µs" 2026-03-18T09:58:20.121663452Z I0318 09:58:20.121611 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="57.881µs" 2026-03-18T09:58:21.846027487Z E0318 09:58:21.845933 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1" logger="UnhandledError" 2026-03-18T09:58:21.928177264Z I0318 09:58:21.928067 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-03-18T09:58:21.938736672Z I0318 09:58:21.938644 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" need=1 creating=1 2026-03-18T09:58:21.955219124Z I0318 09:58:21.955139 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T09:58:21.995606681Z I0318 09:58:21.995548 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="56.969662ms" 2026-03-18T09:58:22.014687067Z I0318 09:58:22.014615 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="19.021765ms" 2026-03-18T09:58:22.014955204Z I0318 09:58:22.014814 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="163.054µs" 2026-03-18T09:58:22.041710397Z I0318 09:58:22.041236 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="51.501µs" 2026-03-18T09:58:22.077266476Z I0318 09:58:22.077016 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="33.804375ms" 2026-03-18T09:58:22.083372155Z I0318 09:58:22.083284 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-5c6485487f" duration="100.223µs" 2026-03-18T09:58:22.122667955Z I0318 09:58:22.122113 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="42.402126ms" 2026-03-18T09:58:22.122667955Z I0318 09:58:22.122390 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="59.402µs" 2026-03-18T09:58:22.149866019Z I0318 09:58:22.149770 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="62.772µs" 2026-03-18T09:58:22.745011189Z I0318 09:58:22.744506 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="64.122µs" 2026-03-18T09:58:23.054937450Z I0318 09:58:23.054355 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="1.031246ms" 2026-03-18T09:58:23.058844376Z I0318 09:58:23.058627 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="42.381µs" 2026-03-18T09:58:23.062846643Z I0318 09:58:23.060209 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="38.431µs" 2026-03-18T09:58:23.081203142Z I0318 09:58:23.081112 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="43.801µs" 2026-03-18T09:58:23.081239553Z I0318 09:58:23.081218 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="34.201µs" 2026-03-18T09:58:23.110250262Z I0318 09:58:23.108934 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="105.963µs" 2026-03-18T09:58:23.133299785Z I0318 09:58:23.133131 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="87.302µs" 2026-03-18T09:58:23.152348900Z I0318 09:58:23.152062 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="58.452µs" 2026-03-18T09:58:23.759913063Z I0318 09:58:23.759771 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="59.692µs" 2026-03-18T09:58:23.868292240Z I0318 09:58:23.867672 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="66.722µs" 2026-03-18T09:58:23.911104426Z I0318 09:58:23.910778 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="59.711µs" 2026-03-18T09:58:24.069187578Z I0318 09:58:24.068807 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="14.786502ms" 2026-03-18T09:58:24.069187578Z I0318 09:58:24.068963 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="77.762µs" 2026-03-18T09:58:25.086474509Z I0318 09:58:25.086408 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="17.59835ms" 2026-03-18T09:58:25.087217267Z I0318 09:58:25.087188 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="24.161µs" 2026-03-18T09:58:27.119445025Z I0318 09:58:27.119289 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="79.722µs" 2026-03-18T09:58:27.135803884Z I0318 09:58:27.135727 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="86.492µs" 2026-03-18T09:58:27.165274684Z I0318 09:58:27.165212 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="9.84844ms" 2026-03-18T09:58:27.165353376Z I0318 09:58:27.165333 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="80.482µs" 2026-03-18T09:58:28.128491354Z I0318 09:58:28.128064 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/prometheus-operator-6c8df6d4b" need=1 creating=1 2026-03-18T09:58:28.147409177Z I0318 09:58:28.145249 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T09:58:28.177330928Z I0318 09:58:28.171401 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="43.378309ms" 2026-03-18T09:58:28.184859731Z I0318 09:58:28.181469 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="10.031525ms" 2026-03-18T09:58:28.184859731Z I0318 09:58:28.182228 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="709.557µs" 2026-03-18T09:58:28.188879020Z I0318 09:58:28.187924 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="59.991µs" 2026-03-18T09:58:28.210864497Z I0318 09:58:28.210654 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="48.641µs" 2026-03-18T09:58:29.411979740Z I0318 09:58:29.411909 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="111.633µs" 2026-03-18T09:58:34.686937675Z I0318 09:58:34.685864 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="84.572µs" config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000011444515156473531031016 0ustar00000000000000002026-03-18T09:55:41.596848965Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-18T09:55:41.596848965Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-18T09:55:41.596848965Z (string) (len=20) "aggregator-client-ca", 2026-03-18T09:55:41.596848965Z (string) (len=9) "client-ca" 2026-03-18T09:55:41.596848965Z }, 2026-03-18T09:55:41.596848965Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T09:55:41.596848965Z (string) (len=17) "trusted-ca-bundle" 2026-03-18T09:55:41.596848965Z }, 2026-03-18T09:55:41.596848965Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-18T09:55:41.596848965Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T09:55:41.596848965Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T09:55:41.596848965Z Timeout: (time.Duration) 2m0s, 2026-03-18T09:55:41.596848965Z StaticPodManifestsLockFile: (string) "", 2026-03-18T09:55:41.596848965Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T09:55:41.596848965Z KubeletVersion: (string) "" 2026-03-18T09:55:41.596848965Z }) 2026-03-18T09:55:41.597495531Z I0318 09:55:41.597457 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T09:56:37.933291155Z W0318 09:56:37.933155 1 cmd.go:423] unable to get owner reference (falling back to namespace): Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T09:56:37.933291155Z I0318 09:56:37.933203 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T09:56:37.933291155Z I0318 09:56:37.933255 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T09:56:37.933291155Z I0318 09:56:37.933272 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T09:56:51.935097181Z W0318 09:56:51.934520 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T09:57:01.941557874Z I0318 09:57:01.941454 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-18T09:57:31.941637143Z I0318 09:57:31.941578 1 cmd.go:524] Getting installer pods for node master-0 2026-03-18T09:57:31.945380945Z I0318 09:57:31.945334 1 cmd.go:542] Latest installer revision for node master-0 is: 2 2026-03-18T09:57:31.945380945Z I0318 09:57:31.945354 1 cmd.go:431] Querying kubelet version for node master-0 2026-03-18T09:57:31.947809374Z I0318 09:57:31.947776 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-03-18T09:57:31.947809374Z I0318 09:57:31.947795 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-18T09:57:31.948024049Z I0318 09:57:31.947968 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-18T09:57:31.948024049Z I0318 09:57:31.947987 1 cmd.go:229] Getting secrets ... 2026-03-18T09:57:31.950376097Z I0318 09:57:31.950336 1 copy.go:32] Got secret openshift-kube-controller-manager/localhost-recovery-client-token-2 2026-03-18T09:57:31.952938189Z I0318 09:57:31.952864 1 copy.go:32] Got secret openshift-kube-controller-manager/service-account-private-key-2 2026-03-18T09:57:31.955378069Z I0318 09:57:31.955306 1 copy.go:32] Got secret openshift-kube-controller-manager/serving-cert-2 2026-03-18T09:57:31.955378069Z I0318 09:57:31.955366 1 cmd.go:242] Getting config maps ... 2026-03-18T09:57:31.957439159Z I0318 09:57:31.957363 1 copy.go:60] Got configMap openshift-kube-controller-manager/cluster-policy-controller-config-2 2026-03-18T09:57:31.959136431Z I0318 09:57:31.959074 1 copy.go:60] Got configMap openshift-kube-controller-manager/config-2 2026-03-18T09:57:31.961528759Z I0318 09:57:31.961465 1 copy.go:60] Got configMap openshift-kube-controller-manager/controller-manager-kubeconfig-2 2026-03-18T09:57:31.963731613Z I0318 09:57:31.963668 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-cert-syncer-kubeconfig-2 2026-03-18T09:57:31.965375683Z I0318 09:57:31.965308 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-manager-pod-2 2026-03-18T09:57:32.145699198Z I0318 09:57:32.145636 1 copy.go:60] Got configMap openshift-kube-controller-manager/recycler-config-2 2026-03-18T09:57:32.346064013Z I0318 09:57:32.346000 1 copy.go:60] Got configMap openshift-kube-controller-manager/service-ca-2 2026-03-18T09:57:32.652597742Z I0318 09:57:32.652364 1 copy.go:60] Got configMap openshift-kube-controller-manager/serviceaccount-ca-2 2026-03-18T09:57:32.745446440Z I0318 09:57:32.745401 1 copy.go:52] Failed to get config map openshift-kube-controller-manager/cloud-config-2: configmaps "cloud-config-2" not found 2026-03-18T09:57:32.745446440Z I0318 09:57:32.745428 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token" ... 2026-03-18T09:57:32.745602674Z I0318 09:57:32.745567 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/ca.crt" ... 2026-03-18T09:57:32.745736277Z I0318 09:57:32.745708 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/namespace" ... 2026-03-18T09:57:32.745842310Z I0318 09:57:32.745807 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/token" ... 2026-03-18T09:57:32.745952043Z I0318 09:57:32.745937 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key" ... 2026-03-18T09:57:32.746021314Z I0318 09:57:32.745999 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key/service-account.key" ... 2026-03-18T09:57:32.746133557Z I0318 09:57:32.746110 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert" ... 2026-03-18T09:57:32.746193048Z I0318 09:57:32.746171 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.crt" ... 2026-03-18T09:57:32.746302321Z I0318 09:57:32.746274 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.key" ... 2026-03-18T09:57:32.746395913Z I0318 09:57:32.746373 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config" ... 2026-03-18T09:57:32.746488176Z I0318 09:57:32.746470 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config/config.yaml" ... 2026-03-18T09:57:32.746610119Z I0318 09:57:32.746581 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config" ... 2026-03-18T09:57:32.746669390Z I0318 09:57:32.746645 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config/config.yaml" ... 2026-03-18T09:57:32.746782383Z I0318 09:57:32.746752 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig" ... 2026-03-18T09:57:32.746848474Z I0318 09:57:32.746812 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig/kubeconfig" ... 2026-03-18T09:57:32.747003048Z I0318 09:57:32.746982 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig" ... 2026-03-18T09:57:32.747076680Z I0318 09:57:32.747047 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig" ... 2026-03-18T09:57:32.747175942Z I0318 09:57:32.747158 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod" ... 2026-03-18T09:57:32.747241704Z I0318 09:57:32.747217 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/pod.yaml" ... 2026-03-18T09:57:32.747344537Z I0318 09:57:32.747321 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/version" ... 2026-03-18T09:57:32.747447039Z I0318 09:57:32.747415 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/forceRedeploymentReason" ... 2026-03-18T09:57:32.747523451Z I0318 09:57:32.747499 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config" ... 2026-03-18T09:57:32.747658614Z I0318 09:57:32.747638 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config/recycler-pod.yaml" ... 2026-03-18T09:57:32.747773027Z I0318 09:57:32.747742 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca" ... 2026-03-18T09:57:32.747834879Z I0318 09:57:32.747805 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca/ca-bundle.crt" ... 2026-03-18T09:57:32.747994422Z I0318 09:57:32.747969 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca" ... 2026-03-18T09:57:32.748088755Z I0318 09:57:32.748060 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-03-18T09:57:32.748188737Z I0318 09:57:32.748165 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs" ... 2026-03-18T09:57:32.748233028Z I0318 09:57:32.748221 1 cmd.go:229] Getting secrets ... 2026-03-18T09:57:32.950472969Z I0318 09:57:32.949090 1 copy.go:32] Got secret openshift-kube-controller-manager/csr-signer 2026-03-18T09:57:33.303886033Z I0318 09:57:33.302115 1 copy.go:32] Got secret openshift-kube-controller-manager/kube-controller-manager-client-cert-key 2026-03-18T09:57:33.303886033Z I0318 09:57:33.302191 1 cmd.go:242] Getting config maps ... 2026-03-18T09:57:33.362377802Z I0318 09:57:33.359336 1 copy.go:60] Got configMap openshift-kube-controller-manager/aggregator-client-ca 2026-03-18T09:57:33.545117176Z I0318 09:57:33.545062 1 copy.go:60] Got configMap openshift-kube-controller-manager/client-ca 2026-03-18T09:57:33.755309491Z I0318 09:57:33.755242 1 copy.go:60] Got configMap openshift-kube-controller-manager/trusted-ca-bundle 2026-03-18T09:57:33.793939605Z I0318 09:57:33.755560 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer" ... 2026-03-18T09:57:33.793939605Z I0318 09:57:33.755699 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.crt" ... 2026-03-18T09:57:33.793939605Z I0318 09:57:33.755813 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.key" ... 2026-03-18T09:57:33.795501283Z I0318 09:57:33.794202 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key" ... 2026-03-18T09:57:33.795501283Z I0318 09:57:33.794273 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.key" ... 2026-03-18T09:57:33.795501283Z I0318 09:57:33.794355 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.crt" ... 2026-03-18T09:57:33.795501283Z I0318 09:57:33.794428 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca" ... 2026-03-18T09:57:33.795501283Z I0318 09:57:33.794499 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca/ca-bundle.crt" ... 2026-03-18T09:57:33.795501283Z I0318 09:57:33.794572 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca" ... 2026-03-18T09:57:33.795501283Z I0318 09:57:33.794611 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca/ca-bundle.crt" ... 2026-03-18T09:57:33.795501283Z I0318 09:57:33.794690 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle" ... 2026-03-18T09:57:33.795501283Z I0318 09:57:33.794762 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle/ca-bundle.crt" ... 2026-03-18T09:57:33.795501283Z I0318 09:57:33.795437 1 cmd.go:335] Getting pod configmaps/kube-controller-manager-pod-2 -n openshift-kube-controller-manager 2026-03-18T09:57:33.946201074Z I0318 09:57:33.946125 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-03-18T09:57:33.946201074Z I0318 09:57:33.946170 1 cmd.go:379] Writing a pod under "kube-controller-manager-pod.yaml" key 2026-03-18T09:57:33.946201074Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-2v544 --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-18T09:57:33.950069559Z I0318 09:57:33.950024 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/kube-controller-manager-pod.yaml" ... 2026-03-18T09:57:33.950183292Z I0318 09:57:33.950161 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-18T09:57:33.950183292Z I0318 09:57:33.950171 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-18T09:57:33.950183292Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-2v544 --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715156473531027215 0ustar00000000000000002026-03-18T09:55:33.305664485Z I0318 09:55:33.305402 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc00094caa0 cert-dir:0xc00094cc80 cert-secrets:0xc00094ca00 configmaps:0xc00094c5a0 namespace:0xc00094c3c0 optional-cert-configmaps:0xc00094cbe0 optional-cert-secrets:0xc00094cb40 optional-configmaps:0xc00094c6e0 optional-secrets:0xc00094c640 pod:0xc00094c460 pod-manifest-dir:0xc00094c820 resource-dir:0xc00094c780 revision:0xc00094c320 secrets:0xc00094c500 v:0xc00095c140] [0xc00095c140 0xc00094c320 0xc00094c3c0 0xc00094c460 0xc00094c780 0xc00094c820 0xc00094c5a0 0xc00094c6e0 0xc00094c500 0xc00094c640 0xc00094cc80 0xc00094caa0 0xc00094cbe0 0xc00094ca00 0xc00094cb40] [] map[cert-configmaps:0xc00094caa0 cert-dir:0xc00094cc80 cert-secrets:0xc00094ca00 configmaps:0xc00094c5a0 help:0xc00095c500 kubeconfig:0xc00094c280 log-flush-frequency:0xc00095c0a0 namespace:0xc00094c3c0 optional-cert-configmaps:0xc00094cbe0 optional-cert-secrets:0xc00094cb40 optional-configmaps:0xc00094c6e0 optional-secrets:0xc00094c640 pod:0xc00094c460 pod-manifest-dir:0xc00094c820 pod-manifests-lock-file:0xc00094c960 resource-dir:0xc00094c780 revision:0xc00094c320 secrets:0xc00094c500 timeout-duration:0xc00094c8c0 v:0xc00095c140 vmodule:0xc00095c1e0] [0xc00094c280 0xc00094c320 0xc00094c3c0 0xc00094c460 0xc00094c500 0xc00094c5a0 0xc00094c640 0xc00094c6e0 0xc00094c780 0xc00094c820 0xc00094c8c0 0xc00094c960 0xc00094ca00 0xc00094caa0 0xc00094cb40 0xc00094cbe0 0xc00094cc80 0xc00095c0a0 0xc00095c140 0xc00095c1e0 0xc00095c500] [0xc00094caa0 0xc00094cc80 0xc00094ca00 0xc00094c5a0 0xc00095c500 0xc00094c280 0xc00095c0a0 0xc00094c3c0 0xc00094cbe0 0xc00094cb40 0xc00094c6e0 0xc00094c640 0xc00094c460 0xc00094c820 0xc00094c960 0xc00094c780 0xc00094c320 0xc00094c500 0xc00094c8c0 0xc00095c140 0xc00095c1e0] map[104:0xc00095c500 118:0xc00095c140] [] -1 0 0xc000911b90 true 0xae2140 []} 2026-03-18T09:55:33.305852730Z I0318 09:55:33.305703 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000051ba0)({ 2026-03-18T09:55:33.305852730Z KubeConfig: (string) "", 2026-03-18T09:55:33.305852730Z KubeClient: (kubernetes.Interface) , 2026-03-18T09:55:33.305852730Z Revision: (string) (len=1) "1", 2026-03-18T09:55:33.305852730Z NodeName: (string) "", 2026-03-18T09:55:33.305852730Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-18T09:55:33.305852730Z Clock: (clock.RealClock) { 2026-03-18T09:55:33.305852730Z }, 2026-03-18T09:55:33.305852730Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-18T09:55:33.305852730Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-18T09:55:33.305852730Z (string) (len=11) "etcd-client", 2026-03-18T09:55:33.305852730Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-18T09:55:33.305852730Z (string) (len=31) "localhost-recovery-client-token" 2026-03-18T09:55:33.305852730Z }, 2026-03-18T09:55:33.305852730Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-18T09:55:33.305852730Z (string) (len=17) "encryption-config", 2026-03-18T09:55:33.305852730Z (string) (len=21) "webhook-authenticator" 2026-03-18T09:55:33.305852730Z }, 2026-03-18T09:55:33.305852730Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-18T09:55:33.305852730Z (string) (len=18) "kube-apiserver-pod", 2026-03-18T09:55:33.305852730Z (string) (len=6) "config", 2026-03-18T09:55:33.305852730Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-18T09:55:33.305852730Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-18T09:55:33.305852730Z (string) (len=15) "etcd-serving-ca", 2026-03-18T09:55:33.305852730Z (string) (len=18) "kubelet-serving-ca", 2026-03-18T09:55:33.305852730Z (string) (len=22) "sa-token-signing-certs", 2026-03-18T09:55:33.305852730Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-18T09:55:33.305852730Z }, 2026-03-18T09:55:33.305852730Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-18T09:55:33.305852730Z (string) (len=14) "oauth-metadata", 2026-03-18T09:55:33.305852730Z (string) (len=12) "cloud-config", 2026-03-18T09:55:33.305852730Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-18T09:55:33.305852730Z }, 2026-03-18T09:55:33.305852730Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-18T09:55:33.305852730Z (string) (len=17) "aggregator-client", 2026-03-18T09:55:33.305852730Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-18T09:55:33.305852730Z (string) (len=31) "service-network-serving-certkey", 2026-03-18T09:55:33.305852730Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-18T09:55:33.305852730Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-18T09:55:33.305852730Z (string) (len=33) "bound-service-account-signing-key", 2026-03-18T09:55:33.305852730Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-18T09:55:33.305852730Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-18T09:55:33.305852730Z (string) (len=14) "kubelet-client", 2026-03-18T09:55:33.305852730Z (string) (len=16) "node-kubeconfigs" 2026-03-18T09:55:33.305852730Z }, 2026-03-18T09:55:33.305852730Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-18T09:55:33.305852730Z (string) (len=17) "user-serving-cert", 2026-03-18T09:55:33.305852730Z (string) (len=21) "user-serving-cert-000", 2026-03-18T09:55:33.305852730Z (string) (len=21) "user-serving-cert-001", 2026-03-18T09:55:33.305852730Z (string) (len=21) "user-serving-cert-002", 2026-03-18T09:55:33.305852730Z (string) (len=21) "user-serving-cert-003", 2026-03-18T09:55:33.305852730Z (string) (len=21) "user-serving-cert-004", 2026-03-18T09:55:33.305852730Z (string) (len=21) "user-serving-cert-005", 2026-03-18T09:55:33.305852730Z (string) (len=21) "user-serving-cert-006", 2026-03-18T09:55:33.305852730Z (string) (len=21) "user-serving-cert-007", 2026-03-18T09:55:33.305852730Z (string) (len=21) "user-serving-cert-008", 2026-03-18T09:55:33.305852730Z (string) (len=21) "user-serving-cert-009" 2026-03-18T09:55:33.305852730Z }, 2026-03-18T09:55:33.305852730Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-18T09:55:33.305852730Z (string) (len=20) "aggregator-client-ca", 2026-03-18T09:55:33.305852730Z (string) (len=9) "client-ca", 2026-03-18T09:55:33.305852730Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-18T09:55:33.305852730Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-18T09:55:33.305852730Z }, 2026-03-18T09:55:33.305852730Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T09:55:33.305852730Z (string) (len=17) "trusted-ca-bundle" 2026-03-18T09:55:33.305852730Z }, 2026-03-18T09:55:33.305852730Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-18T09:55:33.305852730Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T09:55:33.305852730Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T09:55:33.305852730Z Timeout: (time.Duration) 2m0s, 2026-03-18T09:55:33.305852730Z StaticPodManifestsLockFile: (string) "", 2026-03-18T09:55:33.305852730Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T09:55:33.305852730Z KubeletVersion: (string) "" 2026-03-18T09:55:33.305852730Z }) 2026-03-18T09:55:33.395317752Z I0318 09:55:33.395260 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T09:55:33.574767509Z I0318 09:55:33.573599 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T09:55:33.574767509Z I0318 09:55:33.573718 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T09:55:33.574767509Z I0318 09:55:33.573737 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T09:55:33.632865876Z I0318 09:55:33.629276 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-18T09:56:03.630134707Z I0318 09:56:03.630011 1 cmd.go:524] Getting installer pods for node master-0 2026-03-18T09:56:17.633922476Z F0318 09:56:17.633787 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115156473531022675 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"5fb70bf3-93cd-4000-be1a-8e21846d5709","resourceVersion":"7794","creationTimestamp":"2026-03-18T09:55:20Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.44/23\"],\"mac_address\":\"0a:58:0a:80:00:2c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.44/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.44\"\n ],\n \"mac\": \"0a:58:0a:80:00:2c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"514093d1-58ec-4a0e-9c95-136decf5b5b9"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:56:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:20Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:56:55Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:56:55Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.44","podIPs":[{"ip":"10.128.0.44"}],"startTime":"2026-03-18T09:55:20Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0318 09:55:33.395260 1 cmd.go:413] Getting controller reference for node master-0\nI0318 09:55:33.573599 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0318 09:55:33.573718 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0318 09:55:33.573737 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0318 09:55:33.629276 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0318 09:56:03.630011 1 cmd.go:524] Getting installer pods for node master-0\nF0318 09:56:17.633787 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-18T09:55:32Z","finishedAt":"2026-03-18T09:56:17Z","containerID":"cri-o://22a0f37f7177929cbf4f5043d36e78b2ea4f84b8562060ced4185a407eb57943"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://22a0f37f7177929cbf4f5043d36e78b2ea4f84b8562060ced4185a407eb57943","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615156473531035775 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-18T09:52:16.355209402Z I0318 09:52:16.354916 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010716315156473531032675 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-18T09:58:24.215254547Z I0318 09:58:24.215188 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:24.272148336Z I0318 09:58:24.272051 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:24.368510081Z I0318 09:58:24.368412 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:24.414882383Z I0318 09:58:24.414782 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:24.472591323Z I0318 09:58:24.472510 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:24.568882245Z I0318 09:58:24.568795 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:24.617258746Z I0318 09:58:24.617186 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:24.675963101Z I0318 09:58:24.675901 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:24.770770147Z I0318 09:58:24.770706 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:24.815857718Z I0318 09:58:24.815752 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:24.871927818Z I0318 09:58:24.871869 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:24.969006950Z I0318 09:58:24.968936 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.014662845Z I0318 09:58:25.014593 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.072389105Z I0318 09:58:25.072320 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.168673687Z I0318 09:58:25.168618 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.193169906Z I0318 09:58:25.193094 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=1 seatDemandAvg=0.012988443614323704 seatDemandStdev=0.11322430810917432 seatDemandSmoothed=8.816299602050773 fairFrac=2.331974373907979 currentCL=1 concurrencyDenominator=1 backstop=false 2026-03-18T09:58:25.217274055Z I0318 09:58:25.217223 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.272369971Z I0318 09:58:25.272317 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.368602162Z I0318 09:58:25.368539 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.415488177Z I0318 09:58:25.415441 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.472794537Z I0318 09:58:25.472739 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.569944440Z I0318 09:58:25.568601 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.614293124Z I0318 09:58:25.614245 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.674219388Z I0318 09:58:25.674175 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.767817634Z I0318 09:58:25.767741 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.815687304Z I0318 09:58:25.814238 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.872327418Z I0318 09:58:25.872278 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:25.969526832Z I0318 09:58:25.969470 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.015387863Z I0318 09:58:26.015311 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.074297232Z I0318 09:58:26.074251 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.168865562Z I0318 09:58:26.167971 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.215406199Z I0318 09:58:26.215346 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.272522234Z I0318 09:58:26.272136 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.369863652Z I0318 09:58:26.368771 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.414628996Z I0318 09:58:26.414554 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.472200272Z I0318 09:58:26.472122 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.569059599Z I0318 09:58:26.569000 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.614870018Z I0318 09:58:26.614752 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.672437384Z I0318 09:58:26.672348 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.769067595Z I0318 09:58:26.768962 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.815489149Z I0318 09:58:26.815436 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.872713737Z I0318 09:58:26.872652 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:26.968199510Z I0318 09:58:26.968126 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.016330585Z I0318 09:58:27.016017 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.074744103Z I0318 09:58:27.073032 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.168666757Z I0318 09:58:27.168622 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.214894446Z I0318 09:58:27.214806 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.272453242Z I0318 09:58:27.272372 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.368504769Z I0318 09:58:27.368355 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.416274206Z I0318 09:58:27.415915 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.472273744Z I0318 09:58:27.472219 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.568331721Z I0318 09:58:27.568260 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.614806296Z I0318 09:58:27.614743 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.673392927Z I0318 09:58:27.673346 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.771892384Z I0318 09:58:27.768376 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.815675673Z I0318 09:58:27.815617 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.873216959Z I0318 09:58:27.873051 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:27.967975044Z I0318 09:58:27.967852 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:28.018080908Z I0318 09:58:28.014256 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:28.074402513Z I0318 09:58:28.074224 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:28.168800959Z I0318 09:58:28.168202 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:28.217438627Z I0318 09:58:28.217368 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:28.273489127Z I0318 09:58:28.273399 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:28.369903142Z I0318 09:58:28.368893 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:28.415365533Z I0318 09:58:28.415252 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:28.472498758Z I0318 09:58:28.472353 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:28.568198786Z I0318 09:58:28.568133 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.044963674Z I0318 09:58:28.614494 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.044963674Z I0318 09:58:28.672663 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.044963674Z I0318 09:58:28.768229 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.062734688Z I0318 09:58:29.062287 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.062734688Z I0318 09:58:29.062573 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.070937408Z I0318 09:58:29.068881 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.083985207Z I0318 09:58:29.083889 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.161594733Z I0318 09:58:29.161523 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.168166434Z I0318 09:58:29.168110 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.214868214Z I0318 09:58:29.214752 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.272953883Z I0318 09:58:29.271993 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.368545139Z I0318 09:58:29.368489 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.414614434Z I0318 09:58:29.414553 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.472574630Z I0318 09:58:29.472522 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.568906574Z I0318 09:58:29.568813 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.614953928Z I0318 09:58:29.614893 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.672128805Z I0318 09:58:29.672046 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.768704025Z I0318 09:58:29.768600 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.814897663Z I0318 09:58:29.814771 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.873431273Z I0318 09:58:29.873124 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:29.967807189Z I0318 09:58:29.967717 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:30.072919896Z I0318 09:58:30.072752 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:30.167962208Z I0318 09:58:30.167892 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:30.276377997Z I0318 09:58:30.276293 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:30.368432226Z I0318 09:58:30.368367 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:30.472862287Z I0318 09:58:30.472762 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:30.567906219Z I0318 09:58:30.567854 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:30.672441653Z I0318 09:58:30.672376 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:30.872005858Z I0318 09:58:30.871928 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:31.072547407Z I0318 09:58:31.072460 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:31.272573314Z I0318 09:58:31.272496 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:31.476977677Z I0318 09:58:31.475450 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T09:58:31.820137890Z I0318 09:58:31.819476 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015156473531031155 0ustar00000000000000002026-03-18T09:52:11.041671679Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115156473531037152 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-smghb2026-03-18T09:57:46.018115645Z I0318 09:57:46.017982 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:57:46.018115645Z I0318 09:57:46.018083 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:57:46.018428923Z I0318 09:57:46.018399 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:46.032917777Z I0318 09:57:46.032864 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-18T09:57:46.389566330Z I0318 09:57:46.389461 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T09:57:46.389566330Z W0318 09:57:46.389514 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:46.389566330Z W0318 09:57:46.389526 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:46.389566330Z W0318 09:57:46.389540 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T09:57:46.389566330Z W0318 09:57:46.389551 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T09:57:46.389642632Z W0318 09:57:46.389560 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T09:57:46.389642632Z W0318 09:57:46.389570 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T09:57:46.392464051Z I0318 09:57:46.391949 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T09:57:46.392464051Z I0318 09:57:46.392278 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-03-18T09:57:46.394036409Z I0318 09:57:46.393092 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T09:57:46.394036409Z I0318 09:57:46.393112 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T09:57:46.394036409Z I0318 09:57:46.393139 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T09:57:46.394036409Z I0318 09:57:46.393151 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:46.394036409Z I0318 09:57:46.393198 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T09:57:46.394036409Z I0318 09:57:46.393214 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:46.394036409Z I0318 09:57:46.393443 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T09:57:46.394036409Z I0318 09:57:46.393480 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T09:57:46.394036409Z I0318 09:57:46.393505 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T09:57:46.493867828Z I0318 09:57:46.493701 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:46.493867828Z I0318 09:57:46.493768 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T09:57:46.494691828Z I0318 09:57:46.493772 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-apiserver-operator_previous.log0000640000000000000000000000161015156473531037344 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-smghb2026-03-18T09:56:55.972933596Z I0318 09:56:55.970680 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:56:55.972933596Z I0318 09:56:55.970787 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:56:55.972933596Z I0318 09:56:55.971209 1 observer_polling.go:159] Starting file observer 2026-03-18T09:56:56.011372737Z I0318 09:56:56.011038 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-18T09:57:29.573874930Z F0318 09:57:29.572476 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-smghb.json0000640000000000000000000001522215156473531030142 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-8b68b9d9b-smghb","generateName":"kube-apiserver-operator-8b68b9d9b-","namespace":"openshift-kube-apiserver-operator","uid":"6a6a616d-012a-479e-ab3d-b21295ea1805","resourceVersion":"10365","creationTimestamp":"2026-03-18T09:52:41Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"8b68b9d9b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-8b68b9d9b","uid":"1f22c70b-35ff-4e1a-9eec-748eb19e8427","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:24Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:46Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:46Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-03-18T09:54:21Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-18T09:57:45Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 09:56:55.970680 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 09:56:55.970787 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 09:56:55.971209 1 observer_polling.go:159] Starting file observer\nI0318 09:56:56.011038 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5\nF0318 09:57:29.572476 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-03-18T09:56:55Z","finishedAt":"2026-03-18T09:57:29Z","containerID":"cri-o://81cd35f002f1f429688cbe007f6618850051907823664181496568b308ab47bb"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://1438e5c0b41d2a2cdef9ebed19bce07d60cb299edfd66da1254cb9b0f6f74353","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007242515156473531025216 0ustar00000000000000002026-03-18T09:55:40.760161458Z 2026-03-18T09:55:40.760161458Z cluster-etcd-operator rev \ 2026-03-18T09:55:40.760161458Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-18T09:55:40.760161458Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-18T09:55:40.760161458Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-18T09:55:40.760161458Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-18T09:55:40.760161458Z securityContext: 2026-03-18T09:55:40.760161458Z privileged: true 2026-03-18T09:55:40.760161458Z resources: 2026-03-18T09:55:40.760161458Z requests: 2026-03-18T09:55:40.760161458Z memory: 50Mi 2026-03-18T09:55:40.760161458Z cpu: 10m 2026-03-18T09:55:40.760161458Z env: 2026-03-18T09:55:40.760161458Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-18T09:55:40.760161458Z value: "https://192.168.32.10:2379" 2026-03-18T09:55:40.760161458Z - name: "ETCDCTL_API" 2026-03-18T09:55:40.760161458Z value: "3" 2026-03-18T09:55:40.760161458Z - name: "ETCDCTL_CACERT" 2026-03-18T09:55:40.760161458Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-18T09:55:40.760161458Z - name: "ETCDCTL_CERT" 2026-03-18T09:55:40.760161458Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-18T09:55:40.760161458Z - name: "ETCDCTL_ENDPOINTS" 2026-03-18T09:55:40.760161458Z value: "https://192.168.32.10:2379" 2026-03-18T09:55:40.760161458Z - name: "ETCDCTL_KEY" 2026-03-18T09:55:40.760161458Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-18T09:55:40.760161458Z - name: "ETCD_CIPHER_SUITES" 2026-03-18T09:55:40.760161458Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-18T09:55:40.760161458Z - name: "ETCD_DATA_DIR" 2026-03-18T09:55:40.760161458Z value: "/var/lib/etcd" 2026-03-18T09:55:40.760161458Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-18T09:55:40.760161458Z value: "2500" 2026-03-18T09:55:40.760161458Z - name: "ETCD_ENABLE_PPROF" 2026-03-18T09:55:40.760266050Z value: "true" 2026-03-18T09:55:40.760266050Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-18T09:55:40.760266050Z value: "1" 2026-03-18T09:55:40.760266050Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-18T09:55:40.760266050Z value: "200ms" 2026-03-18T09:55:40.760266050Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-18T09:55:40.760266050Z value: "5s" 2026-03-18T09:55:40.760266050Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-18T09:55:40.760266050Z value: "500" 2026-03-18T09:55:40.760266050Z - name: "ETCD_IMAGE" 2026-03-18T09:55:40.760266050Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278" 2026-03-18T09:55:40.760266050Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-18T09:55:40.760266050Z value: "existing" 2026-03-18T09:55:40.760266050Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-18T09:55:40.760266050Z value: "8589934592" 2026-03-18T09:55:40.760266050Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-18T09:55:40.760266050Z value: "true" 2026-03-18T09:55:40.760266050Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-18T09:55:40.760266050Z value: "TLS1.2" 2026-03-18T09:55:40.760266050Z - name: "NODE_master_0_ETCD_NAME" 2026-03-18T09:55:40.760266050Z value: "master-0" 2026-03-18T09:55:40.760266050Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-18T09:55:40.760266050Z value: "192.168.32.10" 2026-03-18T09:55:40.760266050Z - name: "NODE_master_0_IP" 2026-03-18T09:55:40.760266050Z value: "192.168.32.10" 2026-03-18T09:55:40.760266050Z volumeMounts: 2026-03-18T09:55:40.760266050Z - mountPath: /var/lib/etcd 2026-03-18T09:55:40.760266050Z name: data-dir 2026-03-18T09:55:40.760266050Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-18T09:55:40.760266050Z name: cert-dir 2026-03-18T09:55:40.760266050Z hostNetwork: true 2026-03-18T09:55:40.760266050Z priority: 2000001000 2026-03-18T09:55:40.760266050Z priorityClassName: system-node-critical 2026-03-18T09:55:40.760266050Z tolerations: 2026-03-18T09:55:40.760266050Z - operator: "Exists" 2026-03-18T09:55:40.760266050Z volumes: 2026-03-18T09:55:40.760266050Z - hostPath: 2026-03-18T09:55:40.760266050Z path: /etc/kubernetes/manifests 2026-03-18T09:55:40.760266050Z name: static-pod-dir 2026-03-18T09:55:40.760266050Z - hostPath: 2026-03-18T09:55:40.760266050Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-18T09:55:40.760266050Z name: resource-dir 2026-03-18T09:55:40.760266050Z - hostPath: 2026-03-18T09:55:40.760266050Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-18T09:55:40.760266050Z name: cert-dir 2026-03-18T09:55:40.760266050Z - hostPath: 2026-03-18T09:55:40.760266050Z path: /var/lib/etcd 2026-03-18T09:55:40.760266050Z type: "" 2026-03-18T09:55:40.760266050Z name: data-dir 2026-03-18T09:55:40.760266050Z - hostPath: 2026-03-18T09:55:40.760266050Z path: /usr/local/bin 2026-03-18T09:55:40.760266050Z name: usr-local-bin 2026-03-18T09:55:40.760266050Z - hostPath: 2026-03-18T09:55:40.760266050Z path: /var/log/etcd 2026-03-18T09:55:40.760266050Z name: log-dir 2026-03-18T09:55:40.760266050Z - hostPath: 2026-03-18T09:55:40.760266050Z path: /etc/kubernetes 2026-03-18T09:55:40.760266050Z name: config-dir 2026-03-18T09:55:40.760266050Z - hostPath: 2026-03-18T09:55:40.760266050Z path: /var/lib/etcd-auto-backup 2026-03-18T09:55:40.760266050Z name: etcd-auto-backup-dir 2026-03-18T09:55:40.766742526Z I0318 09:55:40.764624 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-18T09:55:40.766742526Z I0318 09:55:40.764867 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-18T09:55:40.766742526Z I0318 09:55:40.764876 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-18T09:55:40.766742526Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615156473531023506 0ustar00000000000000002026-03-18T09:56:50.348397051Z I0318 09:56:50.348155 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215156473531024203 0ustar00000000000000002026-03-18T09:56:40.018466687Z I0318 09:56:40.018214 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-03-18T09:57:03.928052374Z I0318 09:57:03.927986 1 etcdcli_pool.go:70] creating a new cached client 2026-03-18T09:57:08.929684421Z I0318 09:57:08.929562 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615156473531024362 0ustar00000000000000002026-03-18T09:56:39.482021907Z {"level":"info","ts":"2026-03-18T09:56:39.481589Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-18T09:56:39.483662807Z {"level":"info","ts":"2026-03-18T09:56:39.483611Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-03-18T09:56:39.484011136Z {"level":"info","ts":"2026-03-18T09:56:39.483960Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-18T09:56:39.484122969Z {"level":"info","ts":"2026-03-18T09:56:39.484061Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-03-18T09:56:39.484155449Z {"level":"info","ts":"2026-03-18T09:56:39.484126Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc000368000/192.168.32.10:9978\""} 2026-03-18T09:56:39.484182620Z {"level":"info","ts":"2026-03-18T09:56:39.484160Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc000368000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-03-18T09:56:39.484182620Z {"level":"info","ts":"2026-03-18T09:56:39.484175Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-03-18T09:56:39.484482047Z {"level":"info","ts":"2026-03-18T09:56:39.484440Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-03-18T09:56:39.484545469Z {"level":"info","ts":"2026-03-18T09:56:39.484499Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-03-18T09:56:39.484615141Z {"level":"info","ts":"2026-03-18T09:56:39.484583Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc000398780 } }"} 2026-03-18T09:56:39.484625791Z {"level":"info","ts":"2026-03-18T09:56:39.484612Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-03-18T09:56:39.484662602Z {"level":"info","ts":"2026-03-18T09:56:39.484642Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-03-18T09:56:39.484686913Z {"level":"info","ts":"2026-03-18T09:56:39.484658Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-03-18T09:56:39.485008151Z {"level":"info","ts":"2026-03-18T09:56:39.484855Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T09:56:39.485058582Z {"level":"info","ts":"2026-03-18T09:56:39.485028Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T09:56:39.485228856Z {"level":"info","ts":"2026-03-18T09:56:39.485131Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, CONNECTING"} 2026-03-18T09:56:39.485783100Z {"level":"info","ts":"2026-03-18T09:56:39.485715Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:39.485845751Z {"level":"warn","ts":"2026-03-18T09:56:39.485794Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:39.485936293Z {"level":"info","ts":"2026-03-18T09:56:39.485900Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:39.485988485Z {"level":"info","ts":"2026-03-18T09:56:39.485956Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, TRANSIENT_FAILURE"} 2026-03-18T09:56:39.486023206Z {"level":"info","ts":"2026-03-18T09:56:39.485995Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-03-18T09:56:39.486083557Z {"level":"info","ts":"2026-03-18T09:56:39.486020Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-03-18T09:56:39.486172189Z {"level":"info","ts":"2026-03-18T09:56:39.486137Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-03-18T09:56:39.486287152Z {"level":"info","ts":"2026-03-18T09:56:39.486254Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-03-18T09:56:39.486297372Z {"level":"info","ts":"2026-03-18T09:56:39.486280Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-03-18T09:56:39.486297372Z {"level":"info","ts":"2026-03-18T09:56:39.486290Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-18T09:56:39.486309753Z {"level":"info","ts":"2026-03-18T09:56:39.486298Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-18T09:56:39.486471967Z {"level":"info","ts":"2026-03-18T09:56:39.486447Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-03-18T09:56:40.487225713Z {"level":"info","ts":"2026-03-18T09:56:40.486886Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:40.487225713Z {"level":"info","ts":"2026-03-18T09:56:40.486978Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, IDLE"} 2026-03-18T09:56:40.487225713Z {"level":"info","ts":"2026-03-18T09:56:40.487026Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T09:56:40.487225713Z {"level":"info","ts":"2026-03-18T09:56:40.487063Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T09:56:40.487316425Z {"level":"info","ts":"2026-03-18T09:56:40.487216Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, CONNECTING"} 2026-03-18T09:56:40.487455739Z {"level":"info","ts":"2026-03-18T09:56:40.487379Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:40.487455739Z {"level":"warn","ts":"2026-03-18T09:56:40.487418Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:40.487476169Z {"level":"info","ts":"2026-03-18T09:56:40.487455Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:40.487550161Z {"level":"info","ts":"2026-03-18T09:56:40.487491Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, TRANSIENT_FAILURE"} 2026-03-18T09:56:42.017515367Z {"level":"info","ts":"2026-03-18T09:56:42.017194Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:42.017515367Z {"level":"info","ts":"2026-03-18T09:56:42.017272Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, IDLE"} 2026-03-18T09:56:42.017560728Z {"level":"info","ts":"2026-03-18T09:56:42.017485Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T09:56:42.017560728Z {"level":"info","ts":"2026-03-18T09:56:42.017520Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T09:56:42.017815474Z {"level":"info","ts":"2026-03-18T09:56:42.017703Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, CONNECTING"} 2026-03-18T09:56:42.018087221Z {"level":"info","ts":"2026-03-18T09:56:42.017999Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:42.018087221Z {"level":"warn","ts":"2026-03-18T09:56:42.018068Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:42.018130322Z {"level":"info","ts":"2026-03-18T09:56:42.018112Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:42.018274986Z {"level":"info","ts":"2026-03-18T09:56:42.018202Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, TRANSIENT_FAILURE"} 2026-03-18T09:56:44.807352031Z {"level":"info","ts":"2026-03-18T09:56:44.807207Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:44.807352031Z {"level":"info","ts":"2026-03-18T09:56:44.807316Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, IDLE"} 2026-03-18T09:56:44.807421803Z {"level":"info","ts":"2026-03-18T09:56:44.807373Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T09:56:44.807442863Z {"level":"info","ts":"2026-03-18T09:56:44.807423Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T09:56:44.807714860Z {"level":"info","ts":"2026-03-18T09:56:44.807562Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, CONNECTING"} 2026-03-18T09:56:44.808079949Z {"level":"info","ts":"2026-03-18T09:56:44.808008Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:44.808079949Z {"level":"warn","ts":"2026-03-18T09:56:44.808059Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:44.808143821Z {"level":"info","ts":"2026-03-18T09:56:44.808099Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:44.808160451Z {"level":"info","ts":"2026-03-18T09:56:44.808143Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, TRANSIENT_FAILURE"} 2026-03-18T09:56:48.546162989Z {"level":"info","ts":"2026-03-18T09:56:48.546015Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T09:56:48.546162989Z {"level":"info","ts":"2026-03-18T09:56:48.546103Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, IDLE"} 2026-03-18T09:56:48.546235981Z {"level":"info","ts":"2026-03-18T09:56:48.546171Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T09:56:48.546280372Z {"level":"info","ts":"2026-03-18T09:56:48.546234Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T09:56:48.546475847Z {"level":"info","ts":"2026-03-18T09:56:48.546381Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, CONNECTING"} 2026-03-18T09:56:48.555730336Z {"level":"info","ts":"2026-03-18T09:56:48.555592Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-03-18T09:56:48.555730336Z {"level":"info","ts":"2026-03-18T09:56:48.555643Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0003a1aa0, READY"} 2026-03-18T09:56:48.555730336Z {"level":"info","ts":"2026-03-18T09:56:48.555700Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-03-18T09:56:48.555730336Z {"level":"info","ts":"2026-03-18T09:56:48.555712Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013631115156473531022717 0ustar00000000000000002026-03-18T09:58:11.266550765Z {"level":"warn","ts":"2026-03-18T09:58:11.264596Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:07.839042Z","time spent":"3.425548735s","remote":"[::1]:57956","response type":"/etcdserverpb.KV/Range","request count":0,"request size":78,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/csistoragecapacities/\" range_end:\"/kubernetes.io/csistoragecapacities0\" count_only:true "} 2026-03-18T09:58:11.266550765Z {"level":"info","ts":"2026-03-18T09:58:11.264153Z","caller":"traceutil/trace.go:171","msg":"trace[817540112] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/clusterextensions.olm.operatorframework.io; range_end:; response_count:1; response_revision:10955; }","duration":"5.414514664s","start":"2026-03-18T09:58:05.849631Z","end":"2026-03-18T09:58:11.264146Z","steps":["trace[817540112] 'agreement among raft nodes before linearized reading' (duration: 5.414414631s)"],"step_count":1} 2026-03-18T09:58:11.266550765Z {"level":"warn","ts":"2026-03-18T09:58:11.264634Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"5.419027074s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-cluster-storage-operator/cluster-storage-operator\" ","response":"range_response_count:1 size:1586"} 2026-03-18T09:58:11.266550765Z {"level":"info","ts":"2026-03-18T09:58:11.264650Z","caller":"traceutil/trace.go:171","msg":"trace[41352929] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-cluster-storage-operator/cluster-storage-operator; range_end:; response_count:1; response_revision:10955; }","duration":"5.419060055s","start":"2026-03-18T09:58:05.845584Z","end":"2026-03-18T09:58:11.264644Z","steps":["trace[41352929] 'agreement among raft nodes before linearized reading' (duration: 5.419030874s)"],"step_count":1} 2026-03-18T09:58:11.266550765Z {"level":"warn","ts":"2026-03-18T09:58:11.264646Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.849626Z","time spent":"5.415005126s","remote":"[::1]:58206","response type":"/etcdserverpb.KV/Range","request count":0,"request size":106,"response count":1,"response size":24817,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/clusterextensions.olm.operatorframework.io\" "} 2026-03-18T09:58:11.266550765Z {"level":"warn","ts":"2026-03-18T09:58:11.264667Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.845576Z","time spent":"5.419087305s","remote":"[::1]:57966","response type":"/etcdserverpb.KV/Range","request count":0,"request size":92,"response count":1,"response size":1610,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-cluster-storage-operator/cluster-storage-operator\" "} 2026-03-18T09:58:11.266550765Z {"level":"warn","ts":"2026-03-18T09:58:11.264684Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"5.40657031s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operator.openshift.io/olms/cluster\" ","response":"range_response_count:1 size:13107"} 2026-03-18T09:58:11.266550765Z {"level":"info","ts":"2026-03-18T09:58:11.264710Z","caller":"traceutil/trace.go:171","msg":"trace[313108866] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/olms/cluster; range_end:; response_count:1; response_revision:10955; }","duration":"5.40660743s","start":"2026-03-18T09:58:05.858094Z","end":"2026-03-18T09:58:11.264702Z","steps":["trace[313108866] 'agreement among raft nodes before linearized reading' (duration: 5.406555059s)"],"step_count":1} 2026-03-18T09:58:11.266550765Z {"level":"warn","ts":"2026-03-18T09:58:11.264395Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"5.420206403s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiregistration.k8s.io/apiservices/v1.security.openshift.io\" ","response":"range_response_count:1 size:3452"} 2026-03-18T09:58:11.266550765Z {"level":"warn","ts":"2026-03-18T09:58:11.264734Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.858087Z","time spent":"5.406640461s","remote":"[::1]:57652","response type":"/etcdserverpb.KV/Range","request count":0,"request size":51,"response count":1,"response size":13131,"request content":"key:\"/kubernetes.io/operator.openshift.io/olms/cluster\" "} 2026-03-18T09:58:11.266550765Z {"level":"warn","ts":"2026-03-18T09:58:11.264500Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.851246Z","time spent":"5.413242432s","remote":"[::1]:57966","response type":"/etcdserverpb.KV/Range","request count":0,"request size":100,"response count":1,"response size":1645,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-cluster-node-tuning-operator/cluster-node-tuning-operator\" "} 2026-03-18T09:58:11.266550765Z {"level":"info","ts":"2026-03-18T09:58:11.264762Z","caller":"traceutil/trace.go:171","msg":"trace[2037514872] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/v1.security.openshift.io; range_end:; response_count:1; response_revision:10955; }","duration":"5.420595272s","start":"2026-03-18T09:58:05.844150Z","end":"2026-03-18T09:58:11.264745Z","steps":["trace[2037514872] 'agreement among raft nodes before linearized reading' (duration: 5.420186612s)"],"step_count":1} 2026-03-18T09:58:11.266550765Z {"level":"warn","ts":"2026-03-18T09:58:11.264796Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.844135Z","time spent":"5.420653734s","remote":"[::1]:58072","response type":"/etcdserverpb.KV/Range","request count":0,"request size":76,"response count":1,"response size":3476,"request content":"key:\"/kubernetes.io/apiregistration.k8s.io/apiservices/v1.security.openshift.io\" "} 2026-03-18T09:58:11.266550765Z {"level":"warn","ts":"2026-03-18T09:58:11.264855Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"5.420635183s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-marketplace\" ","response":"range_response_count:1 size:2511"} 2026-03-18T09:58:11.266550765Z {"level":"info","ts":"2026-03-18T09:58:11.264876Z","caller":"traceutil/trace.go:171","msg":"trace[1048282065] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-marketplace; range_end:; response_count:1; response_revision:10955; }","duration":"5.420683795s","start":"2026-03-18T09:58:05.844186Z","end":"2026-03-18T09:58:11.264870Z","steps":["trace[1048282065] 'agreement among raft nodes before linearized reading' (duration: 5.420625843s)"],"step_count":1} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.264541Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"5.41723468s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.264893Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.844168Z","time spent":"5.420721695s","remote":"[::1]:57880","response type":"/etcdserverpb.KV/Range","request count":0,"request size":49,"response count":1,"response size":2535,"request content":"key:\"/kubernetes.io/namespaces/openshift-marketplace\" "} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.264927Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"5.413585411s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/machinehealthchecks.machine.openshift.io\" ","response":"range_response_count:1 size:12441"} 2026-03-18T09:58:11.266608276Z {"level":"info","ts":"2026-03-18T09:58:11.264926Z","caller":"traceutil/trace.go:171","msg":"trace[1039253338] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10955; }","duration":"5.417629009s","start":"2026-03-18T09:58:05.847278Z","end":"2026-03-18T09:58:11.264907Z","steps":["trace[1039253338] 'agreement among raft nodes before linearized reading' (duration: 5.41724843s)"],"step_count":1} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.263816Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.847861Z","time spent":"5.415951429s","remote":"[::1]:34462","response type":"/etcdserverpb.KV/Range","request count":0,"request size":97,"response count":1,"response size":6875,"request content":"key:\"/kubernetes.io/deployments/openshift-operator-controller/operator-controller-controller-manager\" "} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.264967Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"5.420780167s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/clustercatalogs.olm.operatorframework.io\" ","response":"range_response_count:1 size:20896"} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.264012Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.849565Z","time spent":"5.414433822s","remote":"[::1]:48562","response type":"/etcdserverpb.KV/Range","request count":0,"request size":89,"response count":1,"response size":1146,"request content":"key:\"/kubernetes.io/rolebindings/openshift-cloud-controller-manager/cloud-controller-manager\" "} 2026-03-18T09:58:11.266608276Z {"level":"info","ts":"2026-03-18T09:58:11.264998Z","caller":"traceutil/trace.go:171","msg":"trace[1353664086] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/clustercatalogs.olm.operatorframework.io; range_end:; response_count:1; response_revision:10955; }","duration":"5.420836308s","start":"2026-03-18T09:58:05.844151Z","end":"2026-03-18T09:58:11.264987Z","steps":["trace[1353664086] 'agreement among raft nodes before linearized reading' (duration: 5.420781967s)"],"step_count":1} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.264418Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"4.46384879s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots/\" range_end:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots0\" count_only:true ","response":"range_response_count:0 size:5"} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.265028Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.844135Z","time spent":"5.420886009s","remote":"[::1]:58206","response type":"/etcdserverpb.KV/Range","request count":0,"request size":104,"response count":1,"response size":20920,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/clustercatalogs.olm.operatorframework.io\" "} 2026-03-18T09:58:11.266608276Z {"level":"info","ts":"2026-03-18T09:58:11.265049Z","caller":"traceutil/trace.go:171","msg":"trace[406206470] range","detail":"{range_begin:/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots/; range_end:/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots0; response_count:0; response_revision:10955; }","duration":"4.464506176s","start":"2026-03-18T09:58:06.800524Z","end":"2026-03-18T09:58:11.265030Z","steps":["trace[406206470] 'agreement among raft nodes before linearized reading' (duration: 4.463868461s)"],"step_count":1} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.263424Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"5.412137496s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/proxies/cluster\" ","response":"range_response_count:1 size:730"} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.265098Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:06.800502Z","time spent":"4.464580328s","remote":"[::1]:57636","response type":"/etcdserverpb.KV/Range","request count":0,"request size":116,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots/\" range_end:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots0\" count_only:true "} 2026-03-18T09:58:11.266608276Z {"level":"info","ts":"2026-03-18T09:58:11.265120Z","caller":"traceutil/trace.go:171","msg":"trace[2125281416] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/proxies/cluster; range_end:; response_count:1; response_revision:10955; }","duration":"5.413863897s","start":"2026-03-18T09:58:05.851249Z","end":"2026-03-18T09:58:11.265112Z","steps":["trace[2125281416] 'agreement among raft nodes before linearized reading' (duration: 5.412096684s)"],"step_count":1} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.265151Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.851238Z","time spent":"5.413905959s","remote":"[::1]:58270","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":1,"response size":754,"request content":"key:\"/kubernetes.io/config.openshift.io/proxies/cluster\" "} 2026-03-18T09:58:11.266608276Z {"level":"warn","ts":"2026-03-18T09:58:11.264991Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.847265Z","time spent":"5.417706012s","remote":"[::1]:57734","response type":"/etcdserverpb.KV/Range","request count":0,"request size":50,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 "} 2026-03-18T09:58:11.266608276Z {"level":"info","ts":"2026-03-18T09:58:11.264532Z","caller":"traceutil/trace.go:171","msg":"trace[611397127] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10955; }","duration":"3.420408189s","start":"2026-03-18T09:58:07.844117Z","end":"2026-03-18T09:58:11.264525Z","steps":["trace[611397127] 'agreement among raft nodes before linearized reading' (duration: 3.420366828s)"],"step_count":1} 2026-03-18T09:58:11.266608276Z {"level":"info","ts":"2026-03-18T09:58:11.264472Z","caller":"traceutil/trace.go:171","msg":"trace[1797947621] range","detail":"{range_begin:/kubernetes.io/minions/; range_end:/kubernetes.io/minions0; response_count:0; response_revision:10955; }","duration":"1.388267965s","start":"2026-03-18T09:58:09.876197Z","end":"2026-03-18T09:58:11.264465Z","steps":["trace[1797947621] 'agreement among raft nodes before linearized reading' (duration: 1.388217993s)"],"step_count":1} 2026-03-18T09:58:11.266655337Z {"level":"warn","ts":"2026-03-18T09:58:11.264511Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.847439Z","time spent":"5.417068827s","remote":"[::1]:48562","response type":"/etcdserverpb.KV/Range","request count":0,"request size":81,"response count":1,"response size":1306,"request content":"key:\"/kubernetes.io/rolebindings/openshift-marketplace/openshift-marketplace-metrics\" "} 2026-03-18T09:58:11.266655337Z {"level":"warn","ts":"2026-03-18T09:58:11.264802Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"5.420568142s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/proxies/cluster\" ","response":"range_response_count:1 size:730"} 2026-03-18T09:58:11.266655337Z {"level":"warn","ts":"2026-03-18T09:58:11.265291Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:09.876171Z","time spent":"1.389108815s","remote":"[::1]:48406","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":1,"response size":31,"request content":"key:\"/kubernetes.io/minions/\" range_end:\"/kubernetes.io/minions0\" count_only:true "} 2026-03-18T09:58:11.266655337Z {"level":"info","ts":"2026-03-18T09:58:11.265325Z","caller":"traceutil/trace.go:171","msg":"trace[1357659348] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/proxies/cluster; range_end:; response_count:1; response_revision:10955; }","duration":"5.421109925s","start":"2026-03-18T09:58:05.844198Z","end":"2026-03-18T09:58:11.265308Z","steps":["trace[1357659348] 'agreement among raft nodes before linearized reading' (duration: 5.420585492s)"],"step_count":1} 2026-03-18T09:58:11.266655337Z {"level":"warn","ts":"2026-03-18T09:58:11.265274Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:07.844100Z","time spent":"3.421167947s","remote":"[::1]:57572","response type":"/etcdserverpb.KV/Range","request count":0,"request size":60,"response count":1,"response size":5525,"request content":"key:\"/kubernetes.io/config.openshift.io/clusterversions/version\" "} 2026-03-18T09:58:11.266655337Z {"level":"warn","ts":"2026-03-18T09:58:11.264770Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"5.419212799s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-operator-lifecycle-manager/collect-profiles\" ","response":"range_response_count:0 size:5"} 2026-03-18T09:58:11.266655337Z {"level":"warn","ts":"2026-03-18T09:58:11.265378Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.844179Z","time spent":"5.421184667s","remote":"[::1]:58270","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":1,"response size":754,"request content":"key:\"/kubernetes.io/config.openshift.io/proxies/cluster\" "} 2026-03-18T09:58:11.266655337Z {"level":"info","ts":"2026-03-18T09:58:11.265403Z","caller":"traceutil/trace.go:171","msg":"trace[1731463527] range","detail":"{range_begin:/kubernetes.io/roles/openshift-operator-lifecycle-manager/collect-profiles; range_end:; response_count:0; response_revision:10955; }","duration":"5.419870264s","start":"2026-03-18T09:58:05.845525Z","end":"2026-03-18T09:58:11.265395Z","steps":["trace[1731463527] 'agreement among raft nodes before linearized reading' (duration: 5.419228789s)"],"step_count":1} 2026-03-18T09:58:11.266655337Z {"level":"info","ts":"2026-03-18T09:58:11.264960Z","caller":"traceutil/trace.go:171","msg":"trace[698794013] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/machinehealthchecks.machine.openshift.io; range_end:; response_count:1; response_revision:10955; }","duration":"5.413632222s","start":"2026-03-18T09:58:05.851318Z","end":"2026-03-18T09:58:11.264951Z","steps":["trace[698794013] 'agreement among raft nodes before linearized reading' (duration: 5.413568001s)"],"step_count":1} 2026-03-18T09:58:11.266655337Z {"level":"warn","ts":"2026-03-18T09:58:11.265430Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.845512Z","time spent":"5.419911446s","remote":"[::1]:58692","response type":"/etcdserverpb.KV/Range","request count":0,"request size":76,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/roles/openshift-operator-lifecycle-manager/collect-profiles\" "} 2026-03-18T09:58:11.266655337Z {"level":"warn","ts":"2026-03-18T09:58:11.265435Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.851312Z","time spent":"5.414115474s","remote":"[::1]:58206","response type":"/etcdserverpb.KV/Range","request count":0,"request size":104,"response count":1,"response size":12465,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/machinehealthchecks.machine.openshift.io\" "} 2026-03-18T09:58:11.266655337Z {"level":"info","ts":"2026-03-18T09:58:11.264466Z","caller":"traceutil/trace.go:171","msg":"trace[336197774] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-console-operator; range_end:; response_count:0; response_revision:10955; }","duration":"5.362485892s","start":"2026-03-18T09:58:05.901971Z","end":"2026-03-18T09:58:11.264457Z","steps":["trace[336197774] 'agreement among raft nodes before linearized reading' (duration: 5.362459252s)"],"step_count":1} 2026-03-18T09:58:11.266655337Z {"level":"warn","ts":"2026-03-18T09:58:11.265489Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.901955Z","time spent":"5.363529329s","remote":"[::1]:57880","response type":"/etcdserverpb.KV/Range","request count":0,"request size":54,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/namespaces/openshift-console-operator\" "} 2026-03-18T09:58:11.266655337Z {"level":"warn","ts":"2026-03-18T09:58:11.264606Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:05.845587Z","time spent":"5.419012754s","remote":"[::1]:57966","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":1055,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/certified-operators\" "} 2026-03-18T09:58:11.266655337Z {"level":"info","ts":"2026-03-18T09:58:11.265910Z","caller":"traceutil/trace.go:171","msg":"trace[1737481078] transaction","detail":"{read_only:false; response_revision:10956; number_of_response:1; }","duration":"1.137302934s","start":"2026-03-18T09:58:10.128593Z","end":"2026-03-18T09:58:11.265896Z","steps":["trace[1737481078] 'process raft request' (duration: 1.134540706s)"],"step_count":1} 2026-03-18T09:58:11.266655337Z {"level":"warn","ts":"2026-03-18T09:58:11.266014Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:10.128527Z","time spent":"1.137422966s","remote":"[::1]:48532","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":6942,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-03-18T09:58:11.419573593Z {"level":"info","ts":"2026-03-18T09:58:11.419452Z","caller":"traceutil/trace.go:171","msg":"trace[1830789120] transaction","detail":"{read_only:false; response_revision:10957; number_of_response:1; }","duration":"1.284922459s","start":"2026-03-18T09:58:10.134505Z","end":"2026-03-18T09:58:11.419428Z","steps":["trace[1830789120] 'process raft request' (duration: 1.131378798s)","trace[1830789120] 'compare' (duration: 153.230634ms)"],"step_count":2} 2026-03-18T09:58:11.419683246Z {"level":"warn","ts":"2026-03-18T09:58:11.419619Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:10.134489Z","time spent":"1.285033233s","remote":"[::1]:34462","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":6142,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-03-18T09:58:11.423848497Z {"level":"info","ts":"2026-03-18T09:58:11.423703Z","caller":"traceutil/trace.go:171","msg":"trace[1793649483] transaction","detail":"{read_only:false; response_revision:10958; number_of_response:1; }","duration":"649.920247ms","start":"2026-03-18T09:58:10.773751Z","end":"2026-03-18T09:58:11.423671Z","steps":["trace[1793649483] 'process raft request' (duration: 649.749543ms)"],"step_count":1} 2026-03-18T09:58:11.423848497Z {"level":"info","ts":"2026-03-18T09:58:11.423768Z","caller":"traceutil/trace.go:171","msg":"trace[1714404232] linearizableReadLoop","detail":"{readStateIndex:11474; appliedIndex:11474; }","duration":"160.407629ms","start":"2026-03-18T09:58:11.263343Z","end":"2026-03-18T09:58:11.423751Z","steps":["trace[1714404232] 'read index received' (duration: 160.403009ms)","trace[1714404232] 'applied index is now lower than readState.Index' (duration: 3.94µs)"],"step_count":2} 2026-03-18T09:58:11.424407141Z {"level":"warn","ts":"2026-03-18T09:58:11.423918Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"485.768087ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs/\" range_end:\"/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs0\" count_only:true ","response":"range_response_count:0 size:5"} 2026-03-18T09:58:11.424407141Z {"level":"info","ts":"2026-03-18T09:58:11.423952Z","caller":"traceutil/trace.go:171","msg":"trace[1661813590] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs/; range_end:/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs0; response_count:0; response_revision:10958; }","duration":"485.85484ms","start":"2026-03-18T09:58:10.938087Z","end":"2026-03-18T09:58:11.423942Z","steps":["trace[1661813590] 'agreement among raft nodes before linearized reading' (duration: 485.782588ms)"],"step_count":1} 2026-03-18T09:58:11.424407141Z {"level":"warn","ts":"2026-03-18T09:58:11.423953Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:10.773716Z","time spent":"650.082211ms","remote":"[::1]:48698","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":2562,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-03-18T09:58:11.424407141Z {"level":"warn","ts":"2026-03-18T09:58:11.423977Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:10.938066Z","time spent":"485.90523ms","remote":"[::1]:57802","response type":"/etcdserverpb.KV/Range","request count":0,"request size":152,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs/\" range_end:\"/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs0\" count_only:true "} 2026-03-18T09:58:11.424407141Z {"level":"warn","ts":"2026-03-18T09:58:11.423978Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"627.581112ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/ingress/\" range_end:\"/kubernetes.io/ingress0\" count_only:true ","response":"range_response_count:0 size:5"} 2026-03-18T09:58:11.424407141Z {"level":"info","ts":"2026-03-18T09:58:11.424025Z","caller":"traceutil/trace.go:171","msg":"trace[777439079] range","detail":"{range_begin:/kubernetes.io/ingress/; range_end:/kubernetes.io/ingress0; response_count:0; response_revision:10958; }","duration":"627.660783ms","start":"2026-03-18T09:58:10.796353Z","end":"2026-03-18T09:58:11.424013Z","steps":["trace[777439079] 'agreement among raft nodes before linearized reading' (duration: 627.564191ms)"],"step_count":1} 2026-03-18T09:58:11.424407141Z {"level":"warn","ts":"2026-03-18T09:58:11.423955Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"358.302193ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/persistentvolumeclaims/\" range_end:\"/kubernetes.io/persistentvolumeclaims0\" count_only:true ","response":"range_response_count:0 size:5"} 2026-03-18T09:58:11.424407141Z {"level":"warn","ts":"2026-03-18T09:58:11.424057Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:10.796334Z","time spent":"627.715495ms","remote":"[::1]:58634","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/ingress/\" range_end:\"/kubernetes.io/ingress0\" count_only:true "} 2026-03-18T09:58:11.424407141Z {"level":"info","ts":"2026-03-18T09:58:11.424140Z","caller":"traceutil/trace.go:171","msg":"trace[1819507488] range","detail":"{range_begin:/kubernetes.io/persistentvolumeclaims/; range_end:/kubernetes.io/persistentvolumeclaims0; response_count:0; response_revision:10958; }","duration":"358.479368ms","start":"2026-03-18T09:58:11.065588Z","end":"2026-03-18T09:58:11.424067Z","steps":["trace[1819507488] 'agreement among raft nodes before linearized reading' (duration: 358.201701ms)"],"step_count":1} 2026-03-18T09:58:11.424407141Z {"level":"warn","ts":"2026-03-18T09:58:11.424262Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T09:58:11.065564Z","time spent":"358.677792ms","remote":"[::1]:57758","response type":"/etcdserverpb.KV/Range","request count":0,"request size":82,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/persistentvolumeclaims/\" range_end:\"/kubernetes.io/persistentvolumeclaims0\" count_only:true "} 2026-03-18T09:58:11.436789864Z {"level":"info","ts":"2026-03-18T09:58:11.436694Z","caller":"traceutil/trace.go:171","msg":"trace[1762346120] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/v1.template.openshift.io; range_end:; response_count:1; response_revision:10960; }","duration":"167.461951ms","start":"2026-03-18T09:58:11.269210Z","end":"2026-03-18T09:58:11.436672Z","steps":["trace[1762346120] 'agreement among raft nodes before linearized reading' (duration: 167.400389ms)"],"step_count":1} 2026-03-18T09:58:11.437044990Z {"level":"info","ts":"2026-03-18T09:58:11.436946Z","caller":"traceutil/trace.go:171","msg":"trace[254047690] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-catalogd/catalogd-controller-manager; range_end:; response_count:1; response_revision:10960; }","duration":"152.419764ms","start":"2026-03-18T09:58:11.284502Z","end":"2026-03-18T09:58:11.436921Z","steps":["trace[254047690] 'agreement among raft nodes before linearized reading' (duration: 152.366463ms)"],"step_count":1} 2026-03-18T09:58:11.437122882Z {"level":"info","ts":"2026-03-18T09:58:11.437083Z","caller":"traceutil/trace.go:171","msg":"trace[1390050450] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-catalogd/catalogd-controller-manager; range_end:; response_count:1; response_revision:10960; }","duration":"155.274783ms","start":"2026-03-18T09:58:11.281736Z","end":"2026-03-18T09:58:11.437011Z","steps":["trace[1390050450] 'agreement among raft nodes before linearized reading' (duration: 155.231912ms)"],"step_count":1} 2026-03-18T09:58:11.437189793Z {"level":"info","ts":"2026-03-18T09:58:11.437121Z","caller":"traceutil/trace.go:171","msg":"trace[336659460] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook; range_end:; response_count:1; response_revision:10960; }","duration":"164.933839ms","start":"2026-03-18T09:58:11.272168Z","end":"2026-03-18T09:58:11.437102Z","steps":["trace[336659460] 'agreement among raft nodes before linearized reading' (duration: 164.879538ms)"],"step_count":1} 2026-03-18T09:58:11.437269305Z {"level":"info","ts":"2026-03-18T09:58:11.437204Z","caller":"traceutil/trace.go:171","msg":"trace[425209812] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/olms/cluster; range_end:; response_count:1; response_revision:10960; }","duration":"165.817531ms","start":"2026-03-18T09:58:11.271374Z","end":"2026-03-18T09:58:11.437191Z","steps":["trace[425209812] 'agreement among raft nodes before linearized reading' (duration: 165.737469ms)"],"step_count":1} 2026-03-18T09:58:11.437302556Z {"level":"info","ts":"2026-03-18T09:58:11.437254Z","caller":"traceutil/trace.go:171","msg":"trace[273216722] transaction","detail":"{read_only:false; response_revision:10959; number_of_response:1; }","duration":"160.07951ms","start":"2026-03-18T09:58:11.277153Z","end":"2026-03-18T09:58:11.437232Z","steps":["trace[273216722] 'process raft request' (duration: 159.180688ms)"],"step_count":1} 2026-03-18T09:58:11.437408839Z {"level":"info","ts":"2026-03-18T09:58:11.437325Z","caller":"traceutil/trace.go:171","msg":"trace[1585366664] range","detail":"{range_begin:/kubernetes.io/roles/openshift-marketplace/openshift-marketplace-metrics; range_end:; response_count:1; response_revision:10960; }","duration":"160.159812ms","start":"2026-03-18T09:58:11.277148Z","end":"2026-03-18T09:58:11.437308Z","steps":["trace[1585366664] 'agreement among raft nodes before linearized reading' (duration: 160.123011ms)"],"step_count":1} 2026-03-18T09:58:11.437543382Z {"level":"info","ts":"2026-03-18T09:58:11.437508Z","caller":"traceutil/trace.go:171","msg":"trace[1081960284] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:aggregate-snapshots-to-storage-admin; range_end:; response_count:1; response_revision:10960; }","duration":"152.997648ms","start":"2026-03-18T09:58:11.284499Z","end":"2026-03-18T09:58:11.437496Z","steps":["trace[1081960284] 'agreement among raft nodes before linearized reading' (duration: 152.950147ms)"],"step_count":1} 2026-03-18T09:58:11.437590413Z {"level":"info","ts":"2026-03-18T09:58:11.437542Z","caller":"traceutil/trace.go:171","msg":"trace[765579318] transaction","detail":"{read_only:false; response_revision:10960; number_of_response:1; }","duration":"155.930689ms","start":"2026-03-18T09:58:11.281594Z","end":"2026-03-18T09:58:11.437525Z","steps":["trace[765579318] 'process raft request' (duration: 154.873474ms)"],"step_count":1} 2026-03-18T09:58:11.437787238Z {"level":"info","ts":"2026-03-18T09:58:11.437731Z","caller":"traceutil/trace.go:171","msg":"trace[254682465] transaction","detail":"{read_only:false; number_of_response:0; response_revision:10960; }","duration":"154.469983ms","start":"2026-03-18T09:58:11.283248Z","end":"2026-03-18T09:58:11.437718Z","steps":["trace[254682465] 'process raft request' (duration: 153.300555ms)"],"step_count":1} 2026-03-18T09:58:11.437857570Z {"level":"info","ts":"2026-03-18T09:58:11.437746Z","caller":"traceutil/trace.go:171","msg":"trace[1246187194] range","detail":"{range_begin:/kubernetes.io/clusterroles/cluster-node-tuning-operator; range_end:; response_count:1; response_revision:10960; }","duration":"153.333926ms","start":"2026-03-18T09:58:11.284401Z","end":"2026-03-18T09:58:11.437735Z","steps":["trace[1246187194] 'agreement among raft nodes before linearized reading' (duration: 153.308225ms)"],"step_count":1} 2026-03-18T09:58:11.438056874Z {"level":"info","ts":"2026-03-18T09:58:11.438021Z","caller":"traceutil/trace.go:171","msg":"trace[1240983763] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-machine-api/cluster-autoscaler-operator; range_end:; response_count:1; response_revision:10960; }","duration":"153.618663ms","start":"2026-03-18T09:58:11.284393Z","end":"2026-03-18T09:58:11.438012Z","steps":["trace[1240983763] 'agreement among raft nodes before linearized reading' (duration: 153.588763ms)"],"step_count":1} 2026-03-18T09:58:11.438202728Z {"level":"info","ts":"2026-03-18T09:58:11.438118Z","caller":"traceutil/trace.go:171","msg":"trace[585990930] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-marketplace; range_end:; response_count:1; response_revision:10960; }","duration":"165.724659ms","start":"2026-03-18T09:58:11.272381Z","end":"2026-03-18T09:58:11.438105Z","steps":["trace[585990930] 'agreement among raft nodes before linearized reading' (duration: 165.667137ms)"],"step_count":1} 2026-03-18T09:58:11.438287440Z {"level":"info","ts":"2026-03-18T09:58:11.438228Z","caller":"traceutil/trace.go:171","msg":"trace[220403701] range","detail":"{range_begin:/kubernetes.io/roles/openshift-image-registry/node-ca; range_end:; response_count:1; response_revision:10960; }","duration":"145.762691ms","start":"2026-03-18T09:58:11.292447Z","end":"2026-03-18T09:58:11.438210Z","steps":["trace[220403701] 'agreement among raft nodes before linearized reading' (duration: 145.72057ms)"],"step_count":1} 2026-03-18T09:58:11.438349982Z {"level":"info","ts":"2026-03-18T09:58:11.438284Z","caller":"traceutil/trace.go:171","msg":"trace[925270571] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/collect-profiles; range_end:; response_count:0; response_revision:10960; }","duration":"153.146532ms","start":"2026-03-18T09:58:11.285118Z","end":"2026-03-18T09:58:11.438264Z","steps":["trace[925270571] 'agreement among raft nodes before linearized reading' (duration: 153.115121ms)"],"step_count":1} 2026-03-18T09:58:11.438436894Z {"level":"info","ts":"2026-03-18T09:58:11.438407Z","caller":"traceutil/trace.go:171","msg":"trace[27580237] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift/cluster-samples-operator-openshift-edit; range_end:; response_count:1; response_revision:10960; }","duration":"156.084473ms","start":"2026-03-18T09:58:11.282314Z","end":"2026-03-18T09:58:11.438399Z","steps":["trace[27580237] 'agreement among raft nodes before linearized reading' (duration: 156.011401ms)"],"step_count":1} 2026-03-18T09:58:11.438542966Z {"level":"info","ts":"2026-03-18T09:58:11.438487Z","caller":"traceutil/trace.go:171","msg":"trace[1919638402] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-insights/insights-operator-obfuscation-secret; range_end:; response_count:1; response_revision:10960; }","duration":"153.385548ms","start":"2026-03-18T09:58:11.285087Z","end":"2026-03-18T09:58:11.438472Z","steps":["trace[1919638402] 'agreement among raft nodes before linearized reading' (duration: 153.350937ms)"],"step_count":1} 2026-03-18T09:58:11.438670259Z {"level":"info","ts":"2026-03-18T09:58:11.438566Z","caller":"traceutil/trace.go:171","msg":"trace[1020635763] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/nodes.config.openshift.io; range_end:; response_count:1; response_revision:10960; }","duration":"149.191224ms","start":"2026-03-18T09:58:11.289358Z","end":"2026-03-18T09:58:11.438550Z","steps":["trace[1020635763] 'agreement among raft nodes before linearized reading' (duration: 149.149323ms)"],"step_count":1} 2026-03-18T09:58:11.438749541Z {"level":"info","ts":"2026-03-18T09:58:11.438717Z","caller":"traceutil/trace.go:171","msg":"trace[2061469151] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/schedulers/cluster; range_end:; response_count:1; response_revision:10960; }","duration":"156.520493ms","start":"2026-03-18T09:58:11.282188Z","end":"2026-03-18T09:58:11.438708Z","steps":["trace[2061469151] 'agreement among raft nodes before linearized reading' (duration: 156.448482ms)"],"step_count":1} 2026-03-18T09:58:11.438962327Z {"level":"info","ts":"2026-03-18T09:58:11.438930Z","caller":"traceutil/trace.go:171","msg":"trace[620175034] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/subscriptions; range_end:; response_count:0; response_revision:10960; }","duration":"156.902504ms","start":"2026-03-18T09:58:11.282019Z","end":"2026-03-18T09:58:11.438922Z","steps":["trace[620175034] 'agreement among raft nodes before linearized reading' (duration: 156.885073ms)"],"step_count":1} 2026-03-18T09:58:11.439162161Z {"level":"info","ts":"2026-03-18T09:58:11.439053Z","caller":"traceutil/trace.go:171","msg":"trace[1551785191] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/controllerconfigs.machineconfiguration.openshift.io; range_end:; response_count:1; response_revision:10960; }","duration":"152.593417ms","start":"2026-03-18T09:58:11.286444Z","end":"2026-03-18T09:58:11.439037Z","steps":["trace[1551785191] 'agreement among raft nodes before linearized reading' (duration: 152.545586ms)"],"step_count":1} 2026-03-18T09:58:11.439264924Z {"level":"info","ts":"2026-03-18T09:58:11.439230Z","caller":"traceutil/trace.go:171","msg":"trace[1125929335] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/cluster-storage-operator-role; range_end:; response_count:1; response_revision:10960; }","duration":"157.427086ms","start":"2026-03-18T09:58:11.281793Z","end":"2026-03-18T09:58:11.439220Z","steps":["trace[1125929335] 'agreement among raft nodes before linearized reading' (duration: 157.394945ms)"],"step_count":1} 2026-03-18T09:58:11.439419098Z {"level":"info","ts":"2026-03-18T09:58:11.439340Z","caller":"traceutil/trace.go:171","msg":"trace[207604756] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-machine-api/cluster-baremetal-webhook-service; range_end:; response_count:1; response_revision:10960; }","duration":"153.372846ms","start":"2026-03-18T09:58:11.285951Z","end":"2026-03-18T09:58:11.439324Z","steps":["trace[207604756] 'agreement among raft nodes before linearized reading' (duration: 153.330195ms)"],"step_count":1} 2026-03-18T09:58:11.439461019Z {"level":"info","ts":"2026-03-18T09:58:11.437082Z","caller":"traceutil/trace.go:171","msg":"trace[1590394666] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-cloud-credential-operator/cloud-credential-operator; range_end:; response_count:1; response_revision:10960; }","duration":"159.683881ms","start":"2026-03-18T09:58:11.277383Z","end":"2026-03-18T09:58:11.437067Z","steps":["trace[1590394666] 'agreement among raft nodes before linearized reading' (duration: 159.63661ms)"],"step_count":1} 2026-03-18T09:58:11.439663354Z {"level":"info","ts":"2026-03-18T09:58:11.439592Z","caller":"traceutil/trace.go:171","msg":"trace[789300543] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/metal3remediations.infrastructure.cluster.x-k8s.io; range_end:; response_count:1; response_revision:10960; }","duration":"153.786457ms","start":"2026-03-18T09:58:11.285792Z","end":"2026-03-18T09:58:11.439578Z","steps":["trace[789300543] 'agreement among raft nodes before linearized reading' (duration: 153.749156ms)"],"step_count":1} 2026-03-18T09:58:11.439663354Z {"level":"info","ts":"2026-03-18T09:58:11.437508Z","caller":"traceutil/trace.go:171","msg":"trace[1781076674] range","detail":"{range_begin:/kubernetes.io/masterleases/; range_end:/kubernetes.io/masterleases0; response_count:1; response_revision:10960; }","duration":"166.826576ms","start":"2026-03-18T09:58:11.270666Z","end":"2026-03-18T09:58:11.437493Z","steps":["trace[1781076674] 'agreement among raft nodes before linearized reading' (duration: 166.786385ms)"],"step_count":1} 2026-03-18T09:58:11.439761176Z {"level":"info","ts":"2026-03-18T09:58:11.438957Z","caller":"traceutil/trace.go:171","msg":"trace[1842266418] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-operator-controller/operator-controller-controller-manager; range_end:; response_count:1; response_revision:10960; }","duration":"151.008019ms","start":"2026-03-18T09:58:11.287933Z","end":"2026-03-18T09:58:11.438941Z","steps":["trace[1842266418] 'agreement among raft nodes before linearized reading' (duration: 150.965818ms)"],"step_count":1} 2026-03-18T09:58:11.439938350Z {"level":"info","ts":"2026-03-18T09:58:11.438268Z","caller":"traceutil/trace.go:171","msg":"trace[2004184053] range","detail":"{range_begin:/kubernetes.io/security.openshift.io/securitycontextconstraints/anyuid; range_end:; response_count:1; response_revision:10960; }","duration":"154.098664ms","start":"2026-03-18T09:58:11.284161Z","end":"2026-03-18T09:58:11.438259Z","steps":["trace[2004184053] 'agreement among raft nodes before linearized reading' (duration: 154.069034ms)"],"step_count":1} 2026-03-18T09:58:11.439938350Z {"level":"info","ts":"2026-03-18T09:58:11.439860Z","caller":"traceutil/trace.go:171","msg":"trace[73173995] range","detail":"{range_begin:/kubernetes.io/roles/openshift-cloud-controller-manager/cloud-controller-manager; range_end:; response_count:1; response_revision:10960; }","duration":"154.027893ms","start":"2026-03-18T09:58:11.285779Z","end":"2026-03-18T09:58:11.439806Z","steps":["trace[73173995] 'agreement among raft nodes before linearized reading' (duration: 153.984412ms)"],"step_count":1} 2026-03-18T09:58:11.440085794Z {"level":"info","ts":"2026-03-18T09:58:11.440040Z","caller":"traceutil/trace.go:171","msg":"trace[749719051] range","detail":"{range_begin:/kubernetes.io/clusterroles/cluster-monitoring-operator-namespaced; range_end:; response_count:1; response_revision:10960; }","duration":"154.447964ms","start":"2026-03-18T09:58:11.285580Z","end":"2026-03-18T09:58:11.440028Z","steps":["trace[749719051] 'agreement among raft nodes before linearized reading' (duration: 154.422313ms)"],"step_count":1} 2026-03-18T09:58:11.440133325Z {"level":"info","ts":"2026-03-18T09:58:11.438008Z","caller":"traceutil/trace.go:171","msg":"trace[1094997491] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-ingress-operator/trusted-ca; range_end:; response_count:1; response_revision:10960; }","duration":"160.85468ms","start":"2026-03-18T09:58:11.277135Z","end":"2026-03-18T09:58:11.437990Z","steps":["trace[1094997491] 'agreement among raft nodes before linearized reading' (duration: 160.418609ms)"],"step_count":1} 2026-03-18T09:58:29.307331833Z {"level":"info","ts":"2026-03-18T09:58:29.307208Z","caller":"traceutil/trace.go:171","msg":"trace[256787250] linearizableReadLoop","detail":"{readStateIndex:12085; appliedIndex:12084; }","duration":"105.089027ms","start":"2026-03-18T09:58:29.202098Z","end":"2026-03-18T09:58:29.307187Z","steps":["trace[256787250] 'read index received' (duration: 104.339978ms)","trace[256787250] 'applied index is now lower than readState.Index' (duration: 748.149µs)"],"step_count":2} 2026-03-18T09:58:29.307556539Z {"level":"info","ts":"2026-03-18T09:58:29.307512Z","caller":"traceutil/trace.go:171","msg":"trace[292174629] transaction","detail":"{read_only:false; response_revision:11518; number_of_response:1; }","duration":"108.990512ms","start":"2026-03-18T09:58:29.198510Z","end":"2026-03-18T09:58:29.307501Z","steps":["trace[292174629] 'process raft request' (duration: 107.983678ms)"],"step_count":1} 2026-03-18T09:58:29.307778874Z {"level":"info","ts":"2026-03-18T09:58:29.307733Z","caller":"traceutil/trace.go:171","msg":"trace[1721876964] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/machineconfigs/98-master-generated-kubelet; range_end:; response_count:1; response_revision:11518; }","duration":"105.627421ms","start":"2026-03-18T09:58:29.202095Z","end":"2026-03-18T09:58:29.307722Z","steps":["trace[1721876964] 'agreement among raft nodes before linearized reading' (duration: 105.59315ms)"],"step_count":1} 2026-03-18T09:58:29.310694975Z {"level":"info","ts":"2026-03-18T09:58:29.310602Z","caller":"traceutil/trace.go:171","msg":"trace[761061528] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-apiserver/etcd-serving-ca; range_end:; response_count:1; response_revision:11518; }","duration":"100.469104ms","start":"2026-03-18T09:58:29.210082Z","end":"2026-03-18T09:58:29.310551Z","steps":["trace[761061528] 'agreement among raft nodes before linearized reading' (duration: 100.425033ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715156473531023134 0ustar00000000000000002026-03-18T09:55:56.514627430Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-6d58f9cc86-7vcln/oauth-apiserver_current.log0000640000000000000000000010143215156473531031402 0ustar00000000000000002026-03-18T09:55:35.372681339Z I0318 09:55:35.372662 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 09:43:15 +0000 UTC to 2036-03-15 09:43:15 +0000 UTC (now=2026-03-18 09:55:35.372649879 +0000 UTC))" 2026-03-18T09:55:35.372690540Z I0318 09:55:35.372683 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 09:43:16 +0000 UTC to 2026-03-19 09:43:16 +0000 UTC (now=2026-03-18 09:55:35.372672459 +0000 UTC))" 2026-03-18T09:55:35.372912535Z I0318 09:55:35.372879 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773827683\" (2026-03-18 09:55:04 +0000 UTC to 2028-03-17 09:55:05 +0000 UTC (now=2026-03-18 09:55:35.372861384 +0000 UTC))" 2026-03-18T09:55:35.373061018Z I0318 09:55:35.373018 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827734\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827734\" (2026-03-18 08:55:34 +0000 UTC to 2029-03-18 08:55:34 +0000 UTC (now=2026-03-18 09:55:35.373003317 +0000 UTC))" 2026-03-18T09:55:35.399359931Z I0318 09:55:35.399297 1 shared_informer.go:320] Caches are synced for *generic.policySource[*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicy,*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicyBinding,k8s.io/apiserver/pkg/admission/plugin/policy/validating.Validator] 2026-03-18T09:55:35.399359931Z I0318 09:55:35.399328 1 policy_source.go:224] refreshing policies 2026-03-18T09:55:35.419865894Z I0318 09:55:35.419709 1 policy_source.go:224] refreshing policies 2026-03-18T09:55:36.421574660Z I0318 09:55:36.421076 1 policy_source.go:224] refreshing policies 2026-03-18T09:55:40.787246169Z W0318 09:55:40.787138 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:40.787782842Z W0318 09:55:40.787444 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:40.787901175Z W0318 09:55:40.787865 1 logging.go:55] [core] [Channel #13 SubChannel #16]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:40.788109570Z W0318 09:55:40.788091 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:40.788210563Z W0318 09:55:40.788194 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:40.788222533Z W0318 09:55:40.788211 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:40.795863857Z W0318 09:55:40.793973 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:40.795863857Z W0318 09:55:40.794414 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:40.795863857Z W0318 09:55:40.794465 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:40.795863857Z W0318 09:55:40.794660 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:41.788219669Z W0318 09:55:41.788166 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:41.788294311Z W0318 09:55:41.788267 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:41.788373012Z W0318 09:55:41.788354 1 logging.go:55] [core] [Channel #13 SubChannel #16]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:41.788502156Z W0318 09:55:41.788485 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:41.788644099Z W0318 09:55:41.788623 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:41.788851014Z W0318 09:55:41.788814 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:41.795534595Z W0318 09:55:41.795357 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:41.795534595Z W0318 09:55:41.795363 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:41.795652888Z W0318 09:55:41.795623 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:41.795661548Z W0318 09:55:41.795643 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:43.093060138Z W0318 09:55:43.092609 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:43.167992090Z W0318 09:55:43.167367 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:43.294892043Z W0318 09:55:43.294808 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:43.312355193Z W0318 09:55:43.312312 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:43.327916988Z W0318 09:55:43.327878 1 logging.go:55] [core] [Channel #13 SubChannel #16]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:43.460593098Z W0318 09:55:43.460530 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:43.478089149Z W0318 09:55:43.478051 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:43.497750882Z W0318 09:55:43.497712 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:43.527417456Z W0318 09:55:43.527351 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:43.673391397Z W0318 09:55:43.673314 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:45.412025603Z W0318 09:55:45.411946 1 logging.go:55] [core] [Channel #13 SubChannel #16]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:45.746236402Z W0318 09:55:45.746179 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:45.768984989Z W0318 09:55:45.768919 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:45.826433651Z W0318 09:55:45.826244 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:45.977058984Z W0318 09:55:45.977002 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:46.113086617Z W0318 09:55:46.113038 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:46.186770709Z W0318 09:55:46.186723 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:46.228287988Z W0318 09:55:46.228225 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:46.233704338Z W0318 09:55:46.233679 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:46.236993177Z W0318 09:55:46.236968 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:49.546510100Z W0318 09:55:49.546463 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:49.571977692Z W0318 09:55:49.571948 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:49.575348463Z W0318 09:55:49.575312 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:49.609778482Z W0318 09:55:49.609750 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:49.759930524Z W0318 09:55:49.759881 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:49.847542831Z W0318 09:55:49.847511 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:49.947911156Z W0318 09:55:49.947877 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:49.972142359Z W0318 09:55:49.972121 1 logging.go:55] [core] [Channel #13 SubChannel #16]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:50.093637751Z W0318 09:55:50.093604 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:50.563503994Z W0318 09:55:50.563387 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:54.860943119Z W0318 09:55:54.860814 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:54.917377847Z W0318 09:55:54.917310 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:55.272895539Z W0318 09:55:55.272757 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:55.321649552Z W0318 09:55:55.321567 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:56.365198656Z W0318 09:55:56.365123 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:56.502379386Z W0318 09:55:56.502306 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:56.594922342Z W0318 09:55:56.594807 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:56.682290144Z W0318 09:55:56.682229 1 logging.go:55] [core] [Channel #13 SubChannel #16]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:57.350868407Z W0318 09:55:57.350800 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:55:57.430882082Z W0318 09:55:57.430755 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:03.746026125Z W0318 09:56:03.745931 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:04.988499472Z W0318 09:56:04.988362 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:04.992033557Z W0318 09:56:04.991962 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:05.193597716Z W0318 09:56:05.193503 1 logging.go:55] [core] [Channel #13 SubChannel #16]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:06.117068051Z W0318 09:56:06.117007 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:06.933906841Z W0318 09:56:06.933850 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:07.480113430Z W0318 09:56:07.480053 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:08.240813069Z W0318 09:56:08.240740 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:08.411413253Z W0318 09:56:08.411309 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:08.490941106Z W0318 09:56:08.490682 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:14.603000635Z W0318 09:56:14.602910 1 logging.go:55] [core] [Channel #37 SubChannel #38]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:15.604313493Z W0318 09:56:15.604244 1 logging.go:55] [core] [Channel #37 SubChannel #38]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:17.035990402Z W0318 09:56:17.035897 1 logging.go:55] [core] [Channel #37 SubChannel #38]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:18.245759844Z W0318 09:56:18.245658 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:18.419168926Z W0318 09:56:18.419045 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:19.483404336Z W0318 09:56:19.483294 1 logging.go:55] [core] [Channel #37 SubChannel #38]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:21.987356073Z W0318 09:56:21.987249 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:22.369122947Z W0318 09:56:22.369038 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:22.438957834Z W0318 09:56:22.438862 1 logging.go:55] [core] [Channel #13 SubChannel #16]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:22.507975472Z W0318 09:56:22.507795 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:23.199969219Z W0318 09:56:23.199885 1 logging.go:55] [core] [Channel #37 SubChannel #38]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:24.182349881Z W0318 09:56:24.182242 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:24.771112886Z W0318 09:56:24.771046 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:25.724045259Z W0318 09:56:25.723942 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:25.932795783Z W0318 09:56:25.932690 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:30.623876725Z W0318 09:56:30.623720 1 logging.go:55] [core] [Channel #37 SubChannel #38]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:56:40.404709012Z W0318 09:56:40.404562 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T09:57:59.308243659Z I0318 09:57:59.308150 1 policy_source.go:224] refreshing policies 2026-03-18T09:58:21.335099055Z I0318 09:58:21.335024 1 policy_source.go:224] refreshing policies 2026-03-18T09:58:22.340601699Z I0318 09:58:22.340486 1 policy_source.go:224] refreshing policies 2026-03-18T09:58:22.353418572Z I0318 09:58:22.353363 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-18T09:58:22.357373159Z I0318 09:58:22.357328 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 config/pod/openshift-ingress/logs/router-default-7dcf5569b5-82tbk/router_current.log0000640000000000000000000000554415156473531027004 0ustar00000000000000002026-03-18T09:58:26.800799230Z I0318 09:58:26.800484 1 template.go:560] "msg"="starting router" "logger"="router" "version"="majorFromGit: \nminorFromGit: \ncommitFromGit: ccd9551702a89cac27e38ebb63801ddb6823d101\nversionFromGit: 4.0.0-565-gccd95517\ngitTreeState: clean\nbuildDate: 2026-02-25T01:31:30Z\n" 2026-03-18T09:58:26.804985532Z I0318 09:58:26.804940 1 metrics.go:156] "msg"="router health and metrics port listening on HTTP and HTTPS" "address"="0.0.0.0:1936" "logger"="metrics" 2026-03-18T09:58:26.811776728Z I0318 09:58:26.811739 1 router.go:217] "msg"="creating a new template router" "logger"="template" "writeDir"="/var/lib/haproxy" 2026-03-18T09:58:26.812002314Z I0318 09:58:26.811962 1 router.go:302] "msg"="router will coalesce reloads within an interval of each other" "interval"="5s" "logger"="template" 2026-03-18T09:58:26.812700901Z I0318 09:58:26.812657 1 router.go:372] "msg"="watching for changes" "logger"="template" "path"="/etc/pki/tls/private" 2026-03-18T09:58:26.812902366Z I0318 09:58:26.812875 1 router.go:283] "msg"="router is including routes in all namespaces" "logger"="router" 2026-03-18T09:58:26.817101588Z W0318 09:58:26.817073 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T09:58:26.817154780Z E0318 09:58:26.817143 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T09:58:26.829529152Z I0318 09:58:26.829469 1 reflector.go:359] Caches populated for *v1.EndpointSlice from github.com/openshift/router/pkg/router/controller/factory/factory.go:124 2026-03-18T09:58:26.839653909Z I0318 09:58:26.839603 1 reflector.go:359] Caches populated for *v1.Service from github.com/openshift/router/pkg/router/template/service_lookup.go:33 2026-03-18T09:58:27.402326015Z I0318 09:58:27.401881 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T09:58:27.402326015Z [-]backend-http failed: backend reported failure 2026-03-18T09:58:27.402326015Z [-]has-synced failed: Router not synced 2026-03-18T09:58:27.704312953Z W0318 09:58:27.704197 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T09:58:27.704312953Z E0318 09:58:27.704279 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) config/pod/openshift-ingress/router-default-7dcf5569b5-82tbk.json0000640000000000000000000001534115156473531023142 0ustar0000000000000000{"metadata":{"name":"router-default-7dcf5569b5-82tbk","generateName":"router-default-7dcf5569b5-","namespace":"openshift-ingress","uid":"43d54514-989c-4c82-93f9-153b44eacdd1","resourceVersion":"6608","creationTimestamp":"2026-03-18T09:55:17Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"677444c44b","pod-template-hash":"7dcf5569b5"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-7dcf5569b5","uid":"c91ad3e5-c91c-4e2a-ba4b-e82156ffd0f2","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-z459j","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-z459j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["677444c44b"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:17Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003430215156473531037407 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-4q9tr2026-03-18T09:57:43.964391074Z Copying system trust bundle 2026-03-18T09:57:44.058066083Z W0318 09:57:44.057646 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-18T09:57:44.058096063Z I0318 09:57:44.058066 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:44.058521704Z I0318 09:57:44.058157 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:57:44.058521704Z I0318 09:57:44.058186 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:57:44.059542519Z I0318 09:57:44.058625 1 observer_polling.go:159] Starting file observer 2026-03-18T09:57:44.076924123Z I0318 09:57:44.076811 1 builder.go:304] cluster-authentication-operator version - 2026-03-18T09:57:44.077605810Z I0318 09:57:44.077540 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T09:57:44.605593679Z I0318 09:57:44.605537 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-18T09:57:44.609307939Z I0318 09:57:44.609272 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-18T09:57:44.609307939Z I0318 09:57:44.609290 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-18T09:57:44.609363091Z I0318 09:57:44.609342 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-18T09:57:44.609363091Z I0318 09:57:44.609359 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-18T09:57:44.613631245Z I0318 09:57:44.613588 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T09:57:44.613631245Z W0318 09:57:44.613606 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:44.613631245Z W0318 09:57:44.613612 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T09:57:44.613631245Z W0318 09:57:44.613616 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T09:57:44.613631245Z W0318 09:57:44.613619 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T09:57:44.613631245Z W0318 09:57:44.613621 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T09:57:44.613631245Z W0318 09:57:44.613624 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T09:57:44.613905132Z I0318 09:57:44.613762 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-18T09:57:44.617632433Z I0318 09:57:44.617523 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T09:57:44.617743805Z I0318 09:57:44.617725 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-03-18T09:57:44.619339734Z I0318 09:57:44.619310 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T09:57:44.619372425Z I0318 09:57:44.619345 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T09:57:44.619372425Z I0318 09:57:44.619356 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773827683\" (2026-03-18 09:54:47 +0000 UTC to 2028-03-17 09:54:48 +0000 UTC (now=2026-03-18 09:57:44.619326714 +0000 UTC))" 2026-03-18T09:57:44.619395386Z I0318 09:57:44.619380 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T09:57:44.619395386Z I0318 09:57:44.619392 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:44.619460177Z I0318 09:57:44.619421 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T09:57:44.619460177Z I0318 09:57:44.619449 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:44.619471348Z I0318 09:57:44.619460 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827864\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827864\" (2026-03-18 08:57:44 +0000 UTC to 2027-03-18 08:57:44 +0000 UTC (now=2026-03-18 09:57:44.619442277 +0000 UTC))" 2026-03-18T09:57:44.619492408Z I0318 09:57:44.619476 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T09:57:44.619501988Z I0318 09:57:44.619496 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-18T09:57:44.619530739Z I0318 09:57:44.619516 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T09:57:44.619539989Z I0318 09:57:44.619530 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T09:57:44.619548570Z I0318 09:57:44.619538 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T09:57:44.619630812Z I0318 09:57:44.619608 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T09:57:44.629024181Z I0318 09:57:44.628328 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-03-18T09:57:44.629024181Z I0318 09:57:44.628439 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-18T09:57:44.629024181Z I0318 09:57:44.628850 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-18T09:57:44.720550837Z I0318 09:57:44.720502 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T09:57:44.720550837Z I0318 09:57:44.720533 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T09:57:44.720646409Z I0318 09:57:44.720630 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T09:57:44.720861815Z I0318 09:57:44.720837 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 09:36:55 +0000 UTC to 2036-03-15 09:36:55 +0000 UTC (now=2026-03-18 09:57:44.720789333 +0000 UTC))" 2026-03-18T09:57:44.720888065Z I0318 09:57:44.720864 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 09:43:17 +0000 UTC to 2026-03-19 09:43:17 +0000 UTC (now=2026-03-18 09:57:44.720851324 +0000 UTC))" 2026-03-18T09:57:44.720888065Z I0318 09:57:44.720877 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 09:43:18 +0000 UTC to 2027-03-18 09:43:18 +0000 UTC (now=2026-03-18 09:57:44.720868995 +0000 UTC))" 2026-03-18T09:57:44.720897416Z I0318 09:57:44.720889 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 09:43:18 +0000 UTC to 2027-03-18 09:43:18 +0000 UTC (now=2026-03-18 09:57:44.720881345 +0000 UTC))" 2026-03-18T09:57:44.720917036Z I0318 09:57:44.720901 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 09:43:15 +0000 UTC to 2036-03-15 09:43:15 +0000 UTC (now=2026-03-18 09:57:44.720893745 +0000 UTC))" 2026-03-18T09:57:44.721065460Z I0318 09:57:44.721044 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773827683\" (2026-03-18 09:54:47 +0000 UTC to 2028-03-17 09:54:48 +0000 UTC (now=2026-03-18 09:57:44.721030189 +0000 UTC))" 2026-03-18T09:57:44.721183713Z I0318 09:57:44.721156 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827864\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827864\" (2026-03-18 08:57:44 +0000 UTC to 2027-03-18 08:57:44 +0000 UTC (now=2026-03-18 09:57:44.721145752 +0000 UTC))" 2026-03-18T09:57:44.721277505Z I0318 09:57:44.721247 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 09:36:55 +0000 UTC to 2036-03-15 09:36:55 +0000 UTC (now=2026-03-18 09:57:44.721237804 +0000 UTC))" 2026-03-18T09:57:44.721277505Z I0318 09:57:44.721263 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 09:43:17 +0000 UTC to 2026-03-19 09:43:17 +0000 UTC (now=2026-03-18 09:57:44.721255984 +0000 UTC))" 2026-03-18T09:57:44.721304545Z I0318 09:57:44.721274 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 09:43:18 +0000 UTC to 2027-03-18 09:43:18 +0000 UTC (now=2026-03-18 09:57:44.721267445 +0000 UTC))" 2026-03-18T09:57:44.721304545Z I0318 09:57:44.721287 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 09:43:18 +0000 UTC to 2027-03-18 09:43:18 +0000 UTC (now=2026-03-18 09:57:44.721279845 +0000 UTC))" 2026-03-18T09:57:44.721304545Z I0318 09:57:44.721297 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 09:43:15 +0000 UTC to 2036-03-15 09:43:15 +0000 UTC (now=2026-03-18 09:57:44.721290745 +0000 UTC))" 2026-03-18T09:57:44.721360227Z I0318 09:57:44.721315 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 09:43:16 +0000 UTC to 2026-03-19 09:43:16 +0000 UTC (now=2026-03-18 09:57:44.721301385 +0000 UTC))" 2026-03-18T09:57:44.721451019Z I0318 09:57:44.721431 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773827683\" (2026-03-18 09:54:47 +0000 UTC to 2028-03-17 09:54:48 +0000 UTC (now=2026-03-18 09:57:44.721420638 +0000 UTC))" 2026-03-18T09:57:44.721568182Z I0318 09:57:44.721538 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773827864\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773827864\" (2026-03-18 08:57:44 +0000 UTC to 2027-03-18 08:57:44 +0000 UTC (now=2026-03-18 09:57:44.721528851 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000000300515156473531037575 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-4q9tr2026-03-18T09:56:55.712133875Z Copying system trust bundle 2026-03-18T09:56:55.819888530Z W0318 09:56:55.819799 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-18T09:56:55.820448894Z I0318 09:56:55.820398 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T09:56:55.820448894Z I0318 09:56:55.820425 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T09:56:55.821431238Z I0318 09:56:55.821395 1 observer_polling.go:159] Starting file observer 2026-03-18T09:56:55.821651394Z I0318 09:56:55.821619 1 observer_polling.go:159] Starting file observer 2026-03-18T09:56:55.845311089Z I0318 09:56:55.845257 1 builder.go:304] cluster-authentication-operator version - 2026-03-18T09:56:55.845961905Z I0318 09:56:55.845926 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T09:57:29.570376225Z I0318 09:57:29.568529 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-18T09:57:29.570376225Z F0318 09:57:29.568654 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-4q9tr.json0000640000000000000000000002045615156473531030305 0ustar0000000000000000{"metadata":{"name":"authentication-operator-5885bfd7f4-4q9tr","generateName":"authentication-operator-5885bfd7f4-","namespace":"openshift-authentication-operator","uid":"f076eaf0-b041-4db0-ba06-3d85e23bb654","resourceVersion":"10296","creationTimestamp":"2026-03-18T09:52:42Z","labels":{"app":"authentication-operator","pod-template-hash":"5885bfd7f4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.20/23\"],\"mac_address\":\"0a:58:0a:80:00:14\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.20/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.20\"\n ],\n \"mac\": \"0a:58:0a:80:00:14\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-5885bfd7f4","uid":"9925a080-f9bd-4e77-abab-328e43048498","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-f25pg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fdcbf7be3f90bd080ffb2c75b091d7eef03681e0f90912ff6140ee48c177616"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.35_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-f25pg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.20","podIPs":[{"ip":"10.128.0.20"}],"startTime":"2026-03-18T09:54:21Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-18T09:57:43Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"Copying system trust bundle\nW0318 09:56:55.819799 1 cmd.go:167] Unable to read initial content of \"/tmp/terminate\": open /tmp/terminate: no such file or directory\nI0318 09:56:55.820398 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 09:56:55.820425 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 09:56:55.821395 1 observer_polling.go:159] Starting file observer\nI0318 09:56:55.821619 1 observer_polling.go:159] Starting file observer\nI0318 09:56:55.845257 1 builder.go:304] cluster-authentication-operator version -\nI0318 09:56:55.845926 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nI0318 09:57:29.568529 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController\nF0318 09:57:29.568654 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-03-18T09:56:55Z","finishedAt":"2026-03-18T09:57:29Z","containerID":"cri-o://7899027579e9cd9f7fcc12484390d733833facf13d02a5193e75c23ee942e285"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","containerID":"cri-o://b5df01736cfc47aa85b36fd7020d93ab1a10c4989f7408f5d6725b96384201c0","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-f25pg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003176115156473531020656 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:48:09Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:48:19Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-7b95f86987 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:48:22Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-5c9796789 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:48:22Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-68f85b4d6c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:48:22Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:48:23Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:48:23Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:52:33Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:52:37Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:52:37Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:52:37Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:52:42Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:52:42Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-7b95f86987-r8fkv","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:52:42Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:52:42Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-68f85b4d6c-fhz5s","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:52:42Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-5c9796789-hc74k","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:52:42Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:54:21Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-5c9796789-hc74k to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:54:21Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-fhz5s to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:54:21Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-r8fkv to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:54:37Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:54:37Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:54:37Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:17Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:17Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:17Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.11/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:17Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:17Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:17Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:17Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:17Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:17Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 14.45s (14.45s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 14.539s (14.539s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 14.426s (14.426s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:33Z","reason":"LeaderElection","message":"package-server-manager-7b95f86987-r8fkv_b81ff191-a412-43de-bcca-c1e615bab26a became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:55:36Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:57:33Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:57:33Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:57:51Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:57:52Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-7b64dcc66c-2vx58","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:57:52Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-7b64dcc66c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:57:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.68/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:57:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:57:56Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T09:57:56Z","reason":"Created","message":"Created container: packageserver","type":"Normal"}]}events/openshift-route-controller-manager.json0000640000000000000000000001442315156473531020401 0ustar0000000000000000{"items":[{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-966f67d76 to 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-966f67d76-nzx5f to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-966f67d76-nzx5f","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-966f67d76 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:05Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-966f67d76-nzx5f","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:05Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-664bd974c9-7w9f6","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-664bd974c9 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:07Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:09Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-664bd974c9-7w9f6 to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:14Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.39/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:14Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b\"","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:21Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-664bd974c9 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-54cf6885f8 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:21Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-664bd974c9-7w9f6","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:22Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-54cf6885f8-xsgcr","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:31Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b\" in 17.562s (17.562s including waiting). Image size: 487096305 bytes.","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:31Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:33Z","reason":"Killing","message":"Stopping container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:33Z","reason":"LeaderElection","message":"route-controller-manager-664bd974c9-7w9f6_07f36a55-c10c-4832-a3d1-6ae7f670ab4f became leader","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:35Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-54cf6885f8-xsgcr to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.50/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:38Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b\" already present on machine","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T09:55:40Z","reason":"LeaderElection","message":"route-controller-manager-54cf6885f8-xsgcr_4b31c2e9-00f6-43d8-b89c-1316306a5b30 became leader","type":"Normal"}]}events/openshift-controller-manager.json0000640000000000000000000002751215156473531017250 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-f5df8899c to 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:42Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-f5df8899c-zvdvg to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:42Z","reason":"FailedCreate","message":"Error creating: pods \"controller-manager-f5df8899c-\" is forbidden: error looking up service account openshift-controller-manager/openshift-controller-manager-sa: serviceaccount \"openshift-controller-manager-sa\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:42Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-f5df8899c-zvdvg","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-f5df8899c to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-66754fd85 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-ca-bundles\" : configmap \"openshift-global-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-f5df8899c-zvdvg","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : configmap \"config\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-66754fd85-wfjgp","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:43Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:45Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-66754fd85-wfjgp","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:45Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-c98c8d65f-kh9fk","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-c98c8d65f to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:45Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-66754fd85 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:45Z","reason":"FailedScheduling","message":"skip schedule deleting pod: openshift-controller-manager/controller-manager-66754fd85-wfjgp","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:47Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-c98c8d65f-kh9fk to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:54:49Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:03Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-c98c8d65f to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:05Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-c98c8d65f-kh9fk","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:05Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:05Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-7667954bb7-xws4c","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-7667954bb7 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:07Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-7667954bb7-xws4c to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.36/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:09Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982\"","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:14Z","reason":"LeaderElection","message":"controller-manager-7667954bb7-xws4c became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:14Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:14Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982\" in 5.102s (5.102s including waiting). Image size: 558211175 bytes.","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:14Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:21Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-f8f5f6bc4-87dt7","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:21Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-7667954bb7-xws4c","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:21Z","reason":"Killing","message":"Stopping container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:21Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-7667954bb7 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-f8f5f6bc4 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:27Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.36:8443/healthz\": dial tcp 10.128.0.36:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:27Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.36:8443/healthz\": dial tcp 10.128.0.36:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:31Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:35Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-f8f5f6bc4-87dt7 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:36Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.49/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:55:40Z","reason":"LeaderElection","message":"controller-manager-f8f5f6bc4-87dt7 became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:56:47Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.49:8443/healthz\": dial tcp 10.128.0.49:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:56:47Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.49:8443/healthz\": dial tcp 10.128.0.49:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:56:55Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.49:8443/healthz\": dial tcp 10.128.0.49:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:56:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:56:55Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:56:55Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:56:55Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.49:8443/healthz\": dial tcp 10.128.0.49:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T09:56:55Z","reason":"LeaderElection","message":"controller-manager-f8f5f6bc4-87dt7 became leader","type":"Normal"}]}events/openshift-controller-manager-operator.json0000640000000000000000000010072715156473531021101 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:48:07Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-controller-manager-operator-8c94f4649 to 1","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:48:17Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-8c94f4649-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:52:36Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-8c94f4649-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:52:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:52:38Z","reason":"SuccessfulCreate","message":"Created pod: openshift-controller-manager-operator-8c94f4649-g25jq","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:21Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-g25jq to master-0","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:22Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:23Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71\" in 17.323s (17.323s including waiting). Image size: 507972093 bytes.","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Created","message":"Created container: openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Started","message":"Started container openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"LeaderElection","message":"openshift-controller-manager-operator-8c94f4649-g25jq_6fa6c00b-84f2-42ed-904c-8a0eb2279313 became leader","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftcontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-route-controller-manager\"}]","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to BuildCSIVolumes=true","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"build\": map[string]any{\n+ \t\t\"buildDefaults\": map[string]any{\"resources\": map[string]any{}},\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e7030c5cce\"...),\n+ \t\t},\n+ \t},\n+ \t\"controllers\": []any{\n+ \t\tstring(\"openshift.io/build\"), string(\"openshift.io/build-config-change\"),\n+ \t\tstring(\"openshift.io/builder-rolebindings\"),\n+ \t\tstring(\"openshift.io/builder-serviceaccount\"),\n+ \t\tstring(\"-openshift.io/default-rolebindings\"), string(\"openshift.io/deployer\"),\n+ \t\tstring(\"openshift.io/deployer-rolebindings\"),\n+ \t\tstring(\"openshift.io/deployer-serviceaccount\"),\n+ \t\tstring(\"openshift.io/deploymentconfig\"), string(\"openshift.io/image-import\"),\n+ \t\tstring(\"openshift.io/image-puller-rolebindings\"),\n+ \t\tstring(\"openshift.io/image-signature-import\"),\n+ \t\tstring(\"openshift.io/image-trigger\"), string(\"openshift.io/ingress-ip\"),\n+ \t\tstring(\"openshift.io/ingress-to-route\"),\n+ \t\tstring(\"openshift.io/origin-namespace\"), ...,\n+ \t},\n+ \t\"deployer\": map[string]any{\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6e5004457a\"...),\n+ \t\t},\n+ \t},\n+ \t\"featureGates\": []any{string(\"BuildCSIVolumes=true\")},\n+ \t\"ingress\": map[string]any{\"ingressIPNetworkCIDR\": string(\"\")},\n }\n","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"ConfigMapCreateFailed","message":"Failed to create configmap/openshift-service-ca-n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"DeploymentCreated","message":"Created Deployment.apps/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"DeploymentCreateFailed","message":"Failed to create Deployment.apps/route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/route-controller-manager-sa -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ServiceCreated","message":"Created Service/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/openshift-global-ca -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-controller-manager-sa -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ServiceCreated","message":"Created Service/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ConfigMapCreated","message":"Created configmap/openshift-service-ca-n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/openshift-global-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"DeploymentCreated","message":"Created Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"All is well\" to \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.openshift-global-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \" to \"All is well\",Progressing changed from Unknown to True (\"Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\"),Available changed from Unknown to False (\"Available: no pods available on any node.\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\" to \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:21Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/controller-manager -n openshift-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.client-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:21Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.client-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-route-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:22Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-controller-manager version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\",Available message changed from \"Available: no pods available on any node.\" to \"Available: no route controller manager deployment pods available on any node.\",status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:57:30Z","reason":"BackOff","message":"Back-off restarting failed container openshift-controller-manager-operator in pod openshift-controller-manager-operator-8c94f4649-g25jq_openshift-controller-manager-operator(3646e0cd-49c9-4a98-a2e3-efe9359cc6c4)","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:57:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:57:41Z","reason":"Created","message":"Created container: openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T09:57:41Z","reason":"Started","message":"Started container openshift-controller-manager-operator","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001260115156473531015446 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:01Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-7649c67db9 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:02Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-7649c67db9-6g66t to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:02Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-7649c67db9-6g66t","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:06Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-7649c67db9-6g66t","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-687747fbb4 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:06Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-7649c67db9 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:06Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-687747fbb4-k7dnf","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:06Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:07Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:09Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-687747fbb4-k7dnf to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:14Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:14Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.40/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:31Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" in 17.582s (17.582s including waiting). Image size: 589386806 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:34Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:34Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:34Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:55:35Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:56:39Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T09:56:48Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[-]etcd failed: reason withheld\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000011145315156473531017304 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:48:07Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-d65958b8 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:48:17Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:52:37Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:52:42Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-d65958b8-zz68c","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:52:43Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:21Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-zz68c to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:22Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.24/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:22Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\" in 17.595s (17.595s including waiting). Image size: 512274055 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"LeaderElection","message":"openshift-apiserver-operator-d65958b8-zz68c_1a3b3018-2be0-472b-8555-88aa1899084b became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:54:58Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:55:01Z","reason":"SecretCreateFailed","message":"Failed to create Secret/etcd-client -n openshift-apiserver: secrets \"etcd-client\" already exists","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"ResourceSyncControllerDegraded: secrets \\\"etcd-client\\\" already exists\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"ResourceSyncControllerDegraded: secrets \\\"etcd-client\\\" already exists\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:55:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:55:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:55:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:30Z","reason":"BackOff","message":"Back-off restarting failed container openshift-apiserver-operator in pod openshift-apiserver-operator-d65958b8-zz68c_openshift-apiserver-operator(0d72e695-0183-4ee8-8add-5425e67f7138)","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:43Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:43Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:44Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:44Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:44Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:44Z","reason":"LeaderElection","message":"openshift-apiserver-operator-d65958b8-zz68c_bdd65266-7aa0-4036-a9df-c35d15e8f974 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:51Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:52Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:52Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:52Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:52Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:52Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:52Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"openshift-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:52Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T09:57:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000010070015156473531020177 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:48:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-dddff6458 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:48:16Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:52:36Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:52:40Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-dddff6458-vj8tt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:52:42Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:21Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-vj8tt to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:22Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.6/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:23Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" in 17.252s (17.252s including waiting). Image size: 506395599 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-dddff6458-vj8tt_ccfb77f4-1835-43cb-9fa8-fcd621f42a83 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:54:59Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:01Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:07Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:09Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:11Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:11Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:17Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:18Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:19Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:20Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:25Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:26Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:26Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:31Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:32Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:32Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:55:40Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:57:30Z","reason":"BackOff","message":"Back-off restarting failed container kube-scheduler-operator-container in pod openshift-kube-scheduler-operator-dddff6458-vj8tt_openshift-kube-scheduler-operator(3414fa1f-e4ee-4c7e-81cd-1fbd86486cd6)","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:57:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:57:41Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T09:57:41Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000001477615156473531016367 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:06Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:06Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:06Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:14Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:33Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:33Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:55:36Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:56:49Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded","type":"Warning"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:56:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:56:56Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:56:56Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:56:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.53/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:29Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 4","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:33Z","reason":"Created","message":"Created container: kube-scheduler-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:33Z","reason":"Created","message":"Created container: wait-for-host-port","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:33Z","reason":"Started","message":"Started container wait-for-host-port","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:33Z","reason":"Created","message":"Created container: kube-scheduler","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:33Z","reason":"Started","message":"Started container kube-scheduler","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:33Z","reason":"Started","message":"Started container kube-scheduler-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:34Z","reason":"LeaderElection","message":"master-0_3fabae59-4d1f-4bbd-b8be-cc401fd719a8 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Created","message":"Created container: kube-scheduler-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Started","message":"Started container kube-scheduler-recovery-controller","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000013357715156473531022036 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:48:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-ff989d6cc to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:48:16Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:52:36Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:52:38Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-ff989d6cc-pzqqc","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:52:39Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:21Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-pzqqc to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:22Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.16/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:23Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" in 17.299s (17.299s including waiting). Image size: 508888171 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"LeaderElection","message":"kube-controller-manager-operator-ff989d6cc-pzqqc_ba496aa7-c916-4ff2-bd3b-5f1c74d5bd77 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-2v544\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\",Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-2v544\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:51Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:52Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:54:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:09Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:09Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:12Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:14Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:15Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:17Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:17Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:17Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:17Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:18Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:22Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:26Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:29Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:30Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/kube-controller-manager-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:30Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:30Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:30Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.16:38527-\u003e172.30.0.10:53: read: connection refused\" to \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.16:48918-\u003e172.30.0.10:53: read: connection refused\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.16:38527-\u003e172.30.0.10:53: read: connection refused\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.16:48918-\u003e172.30.0.10:53: read: connection refused\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:37Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:40Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:40Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:55:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-3 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:57:30Z","reason":"BackOff","message":"Back-off restarting failed container kube-controller-manager-operator in pod kube-controller-manager-operator-ff989d6cc-pzqqc_openshift-kube-controller-manager-operator(0999f781-3299-4cb6-ba76-2a4f4584c685)","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:57:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:57:44Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T09:57:44Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000001233415156473531020170 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:55:33Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:55:33Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:55:35Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:55:40Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.51/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:55:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:55:41Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:55:41Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:33Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 2","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Started","message":"Started container kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Created","message":"Created container: kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Created","message":"Created container: cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Started","message":"Started container cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Created","message":"Created container: kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Started","message":"Started container kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:35Z","reason":"ControlPlaneTopology","message":"unable to get control plane topology, using HA cluster values for leader election: infrastructures.config.openshift.io \"cluster\" is forbidden: User \"system:kube-controller-manager\" cannot get resource \"infrastructures\" in API group \"config.openshift.io\" at the cluster scope","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:35Z","reason":"Created","message":"Created container: kube-controller-manager-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:35Z","reason":"Started","message":"Started container kube-controller-manager-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T09:57:35Z","reason":"LeaderElection","message":"master-0_0f49dd2e-09d5-4632-b3d5-3b39c15a49e8 became leader","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215156473531016372 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T09:55:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000015725215156473531020237 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:48:22Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-8b68b9d9b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:48:23Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:52:36Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:52:42Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:52:42Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-8b68b9d9b-smghb","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:21Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-smghb to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:23Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.12/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:23Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:24Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:24Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:32Z","reason":"LeaderElection","message":"kube-apiserver-operator-8b68b9d9b-smghb_604a2716-fd97-420c-9081-c3ecb16fbdbb became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:32Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:32Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:32Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:32Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:33Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:33Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\"),Upgradeable changed from Unknown to True (\"All is well\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:34Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:35Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:35Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:35Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:35Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:35Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:35Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:35Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:35Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:35Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:35Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:36Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:36Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:37Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:37Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:37Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:37Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:37Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:37Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:37Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:37Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:38Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:38Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:39Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:39Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:39Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:39Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:53Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:58Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:54:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:01Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:06Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:06Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:08Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:09Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:11Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:12Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:13Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:13Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:17Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:55:20Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:57:30Z","reason":"BackOff","message":"Back-off restarting failed container kube-apiserver-operator in pod kube-apiserver-operator-8b68b9d9b-smghb_openshift-kube-apiserver-operator(6a6a616d-012a-479e-ab3d-b21295ea1805)","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:57:45Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:57:45Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T09:57:45Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001327615156473531014376 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:55:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:55:06Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.34/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:55:06Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:55:06Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:55:40Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 1","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:55:40Z","reason":"Killing","message":"Stopping container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:55:40Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:55:56Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:55:56Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:55:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:10Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:10Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:10Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:24Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:24Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:38Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:38Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:39Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:39Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:39Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:39Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:39Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:39Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:40Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T09:56:40Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000003616115156473531016225 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:48:08Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-8544cbcf9c to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:48:18Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:52:36Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:52:40Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-8544cbcf9c-4tlnm","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:52:42Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:21Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-8544cbcf9c-4tlnm to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:22Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:23Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" in 17.304s (17.304s including waiting). Image size: 518384969 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"LeaderElection","message":"etcd-operator-8544cbcf9c-4tlnm_a9268cf7-6e71-484c-a74f-b79fd581b11d became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:54:57Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:56:29Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.7:8443/healthz\": dial tcp 10.128.0.7:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:56:29Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.7:8443/healthz\": dial tcp 10.128.0.7:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:57:29Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.7:8443/healthz\": read tcp 10.128.0.2:55444-\u003e10.128.0.7:8443: read: connection reset by peer\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:57:29Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.7:8443/healthz\": read tcp 10.128.0.2:55444-\u003e10.128.0.7:8443: read: connection reset by peer","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:57:30Z","reason":"BackOff","message":"Back-off restarting failed container etcd-operator in pod etcd-operator-8544cbcf9c-4tlnm_openshift-etcd-operator(a078565a-6970-4f42-84f4-938f1d637245)","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:57:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:57:42Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T09:57:43Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000444115156473531016567 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T09:55:07Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-6d58f9cc86-7vcln to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T09:55:07Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6d58f9cc86-7vcln","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T09:55:07Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6d58f9cc86 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T09:55:14Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T09:55:14Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T09:55:31Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" in 17.577s (17.577s including waiting). Image size: 505345991 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T09:55:32Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T09:55:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T09:55:34Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T09:55:34Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000124015156473531015115 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T09:55:17Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T09:55:17Z","reason":"SuccessfulCreate","message":"Created pod: router-default-7dcf5569b5-82tbk","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T09:55:17Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-7dcf5569b5 to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000022437615156473531020334 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:48:09Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-5885bfd7f4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:48:19Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:52:38Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:52:42Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-5885bfd7f4-4q9tr","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:52:43Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:21Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-5885bfd7f4-4q9tr to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:22Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.20/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:23Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" in 17.104s (17.104s including waiting). Image size: 513221333 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:40Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"LeaderElection","message":"authentication-operator-5885bfd7f4-4q9tr_cce20489-de01-4221-953f-78caf64d2060 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:41Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-sl6m5\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:48Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-sl6m5\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:49Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:52Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:52Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:55Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:57Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:54:57Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:00Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:07Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.55.232:443/healthz\\\": dial tcp 172.30.55.232:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.55.232:443/healthz\\\": dial tcp 172.30.55.232:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.55.232:443/healthz\\\": dial tcp 172.30.55.232:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.55.232:443/healthz\\\": dial tcp 172.30.55.232:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.55.232:443/healthz\\\": dial tcp 172.30.55.232:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.55.232:443/healthz\\\": dial tcp 172.30.55.232:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:20Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:20Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:20Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.55.232:443/healthz\\\": dial tcp 172.30.55.232:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.55.232:443/healthz\\\": dial tcp 172.30.55.232:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.55.232:443/healthz\\\": dial tcp 172.30.55.232:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.55.232:443/healthz\\\": dial tcp 172.30.55.232:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:55:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:56:33Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:56:33Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.20:8443/healthz\": dial tcp 10.128.0.20:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:57:33Z","reason":"BackOff","message":"Back-off restarting failed container authentication-operator in pod authentication-operator-5885bfd7f4-4q9tr_openshift-authentication-operator(f076eaf0-b041-4db0-ba06-3d85e23bb654)","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:57:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:57:43Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T09:57:43Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015156473531016302 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-18T09:55:18Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-18T09:55:18Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003511615156473507014623 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":340,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-canary":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-os-puller","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015156473506014107 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000004533715156473473014564 0ustar0000000000000000Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674009 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="3e884f11-9ace-4ef9-930a-05e170d1bfab" containerName="registry-server" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674027 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="305c97a4-eb1b-4104-b9ba-2603229899b0" containerName="extract-utilities" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674040 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="5fb70bf3-93cd-4000-be1a-8e21846d5709" containerName="installer" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674054 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="1f4cd1d6-3c2a-42bb-a469-5e7dc2d5ba00" containerName="installer" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674069 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="305c97a4-eb1b-4104-b9ba-2603229899b0" containerName="extract-content" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674084 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="af588cc6-5c57-4fea-a8db-84bf34b647a3" containerName="extract-content" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674099 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="af588cc6-5c57-4fea-a8db-84bf34b647a3" containerName="registry-server" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674114 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2a4c7d0e-10a1-44d1-8874-8e2a76753106" containerName="registry-server" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674131 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2a4c7d0e-10a1-44d1-8874-8e2a76753106" containerName="extract-utilities" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674143 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="305c97a4-eb1b-4104-b9ba-2603229899b0" containerName="registry-server" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674157 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="3e884f11-9ace-4ef9-930a-05e170d1bfab" containerName="extract-content" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674171 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="3e884f11-9ace-4ef9-930a-05e170d1bfab" containerName="extract-utilities" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674185 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="af588cc6-5c57-4fea-a8db-84bf34b647a3" containerName="extract-utilities" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674197 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c83737980b9ee109184b1d78e942cf36" containerName="kube-scheduler" Mar 18 09:57:29.676307 master-0 kubenswrapper[8244]: E0318 09:57:29.674212 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2a4c7d0e-10a1-44d1-8874-8e2a76753106" containerName="extract-content" Mar 18 09:57:30.185371 master-0 kubenswrapper[8244]: I0318 09:57:30.185200 8244 patch_prober.go:28] interesting pod/openshift-config-operator-95bf4f4d-495pg container/openshift-config-operator namespace/openshift-config-operator: Readiness probe status=failure output="Get \"https://10.128.0.18:8443/healthz\": dial tcp 10.128.0.18:8443: connect: connection refused" start-of-body= Mar 18 09:57:30.185371 master-0 kubenswrapper[8244]: I0318 09:57:30.185254 8244 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-495pg" podUID="0ed4e3d9-be0c-435a-82d7-5d2fa7b6d480" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.18:8443/healthz\": dial tcp 10.128.0.18:8443: connect: connection refused" Mar 18 09:57:30.299490 master-0 kubenswrapper[8244]: E0318 09:57:30.299449 8244 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"openshift-controller-manager-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=openshift-controller-manager-operator pod=openshift-controller-manager-operator-8c94f4649-g25jq_openshift-controller-manager-operator(3646e0cd-49c9-4a98-a2e3-efe9359cc6c4)\"" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-g25jq" podUID="3646e0cd-49c9-4a98-a2e3-efe9359cc6c4" Mar 18 09:57:30.317175 master-0 kubenswrapper[8244]: E0318 09:57:30.317006 8244 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-scheduler-operator-container\" with CrashLoopBackOff: \"back-off 10s restarting failed container=kube-scheduler-operator-container pod=openshift-kube-scheduler-operator-dddff6458-vj8tt_openshift-kube-scheduler-operator(3414fa1f-e4ee-4c7e-81cd-1fbd86486cd6)\"" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-vj8tt" podUID="3414fa1f-e4ee-4c7e-81cd-1fbd86486cd6" Mar 18 09:57:30.319355 master-0 kubenswrapper[8244]: E0318 09:57:30.319294 8244 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-storage-version-migrator-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=kube-storage-version-migrator-operator pod=kube-storage-version-migrator-operator-6bb5bfb6fd-lk698_openshift-kube-storage-version-migrator-operator(ec53d7fa-445b-4e1d-84ef-545f08e80ccc)\"" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-6bb5bfb6fd-lk698" podUID="ec53d7fa-445b-4e1d-84ef-545f08e80ccc" Mar 18 09:57:30.324689 master-0 kubenswrapper[8244]: E0318 09:57:30.324628 8244 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"network-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=network-operator pod=network-operator-7bd846bfc4-8srnz_openshift-network-operator(9ccdc221-4ec5-487e-8ec4-85284ed628d8)\"" pod="openshift-network-operator/network-operator-7bd846bfc4-8srnz" podUID="9ccdc221-4ec5-487e-8ec4-85284ed628d8" Mar 18 09:57:30.330439 master-0 kubenswrapper[8244]: E0318 09:57:30.330378 8244 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"openshift-apiserver-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=openshift-apiserver-operator pod=openshift-apiserver-operator-d65958b8-zz68c_openshift-apiserver-operator(0d72e695-0183-4ee8-8add-5425e67f7138)\"" pod="openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-zz68c" podUID="0d72e695-0183-4ee8-8add-5425e67f7138" Mar 18 09:57:30.333316 master-0 kubenswrapper[8244]: E0318 09:57:30.332747 8244 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=kube-controller-manager-operator pod=kube-controller-manager-operator-ff989d6cc-pzqqc_openshift-kube-controller-manager-operator(0999f781-3299-4cb6-ba76-2a4f4584c685)\"" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-pzqqc" podUID="0999f781-3299-4cb6-ba76-2a4f4584c685" Mar 18 09:57:30.346226 master-0 kubenswrapper[8244]: E0318 09:57:30.346178 8244 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-apiserver-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=kube-apiserver-operator pod=kube-apiserver-operator-8b68b9d9b-smghb_openshift-kube-apiserver-operator(6a6a616d-012a-479e-ab3d-b21295ea1805)\"" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-smghb" podUID="6a6a616d-012a-479e-ab3d-b21295ea1805" Mar 18 09:57:30.371065 master-0 kubenswrapper[8244]: E0318 09:57:30.370989 8244 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"etcd-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=etcd-operator pod=etcd-operator-8544cbcf9c-4tlnm_openshift-etcd-operator(a078565a-6970-4f42-84f4-938f1d637245)\"" pod="openshift-etcd-operator/etcd-operator-8544cbcf9c-4tlnm" podUID="a078565a-6970-4f42-84f4-938f1d637245" Mar 18 09:57:30.372395 master-0 kubenswrapper[8244]: E0318 09:57:30.372330 8244 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"authentication-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=authentication-operator pod=authentication-operator-5885bfd7f4-4q9tr_openshift-authentication-operator(f076eaf0-b041-4db0-ba06-3d85e23bb654)\"" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-4q9tr" podUID="f076eaf0-b041-4db0-ba06-3d85e23bb654" Mar 18 09:57:30.373162 master-0 kubenswrapper[8244]: E0318 09:57:30.373106 8244 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"service-ca-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=service-ca-operator pod=service-ca-operator-b865698dc-pgtbr_openshift-service-ca-operator(bb35841e-d992-4044-aaaa-06c9faf47bd0)\"" pod="openshift-service-ca-operator/service-ca-operator-b865698dc-pgtbr" podUID="bb35841e-d992-4044-aaaa-06c9faf47bd0" Mar 18 09:57:33.499309 master-0 kubenswrapper[8244]: E0318 09:57:33.499266 8244 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"authentication-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=authentication-operator pod=authentication-operator-5885bfd7f4-4q9tr_openshift-authentication-operator(f076eaf0-b041-4db0-ba06-3d85e23bb654)\"" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-4q9tr" podUID="f076eaf0-b041-4db0-ba06-3d85e23bb654" Mar 18 09:57:33.952601 master-0 kubenswrapper[8244]: E0318 09:57:33.952150 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="46f265536aba6292ead501bc9b49f327" containerName="cluster-policy-controller" Mar 18 09:57:33.952601 master-0 kubenswrapper[8244]: E0318 09:57:33.952175 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="46f265536aba6292ead501bc9b49f327" containerName="kube-controller-manager" Mar 18 09:57:33.952601 master-0 kubenswrapper[8244]: E0318 09:57:33.952196 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="54a208d1-afe8-49b5-92e0-e27afb4abc80" containerName="installer" Mar 18 09:57:33.952601 master-0 kubenswrapper[8244]: E0318 09:57:33.952213 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="46f265536aba6292ead501bc9b49f327" containerName="kube-controller-manager" Mar 18 09:57:33.952601 master-0 kubenswrapper[8244]: E0318 09:57:33.952234 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="46f265536aba6292ead501bc9b49f327" containerName="kube-controller-manager" Mar 18 09:57:33.952601 master-0 kubenswrapper[8244]: E0318 09:57:33.952456 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="46f265536aba6292ead501bc9b49f327" containerName="kube-controller-manager" Mar 18 09:57:51.983733 master-0 kubenswrapper[8244]: E0318 09:57:51.980114 8244 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="a4d7edd6-7975-468e-adea-138d92ed1be1" containerName="installer" Mar 18 09:57:52.535447 master-0 kubenswrapper[8244]: E0318 09:57:52.475469 8244 reflector.go:158] "Unhandled Error" err="object-\"openshift-machine-config-operator\"/\"machine-config-operator-dockercfg-lrdkh\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"machine-config-operator-dockercfg-lrdkh\" is forbidden: User \"system:node:master-0\" cannot list resource \"secrets\" in API group \"\" in the namespace \"openshift-machine-config-operator\": no relationship found between node 'master-0' and this object" logger="UnhandledError" Mar 18 09:57:52.535447 master-0 kubenswrapper[8244]: E0318 09:57:52.482143 8244 reflector.go:158] "Unhandled Error" err="object-\"openshift-machine-config-operator\"/\"machine-config-operator-images\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"machine-config-operator-images\" is forbidden: User \"system:node:master-0\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"openshift-machine-config-operator\": no relationship found between node 'master-0' and this object" logger="UnhandledError" Mar 18 09:57:52.535447 master-0 kubenswrapper[8244]: E0318 09:57:52.482247 8244 reflector.go:158] "Unhandled Error" err="object-\"openshift-operator-lifecycle-manager\"/\"olm-operator-serviceaccount-dockercfg-8wt5h\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"olm-operator-serviceaccount-dockercfg-8wt5h\" is forbidden: User \"system:node:master-0\" cannot list resource \"secrets\" in API group \"\" in the namespace \"openshift-operator-lifecycle-manager\": no relationship found between node 'master-0' and this object" logger="UnhandledError" Mar 18 09:57:52.535447 master-0 kubenswrapper[8244]: E0318 09:57:52.492115 8244 reflector.go:158] "Unhandled Error" err="object-\"openshift-machine-config-operator\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:master-0\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"openshift-machine-config-operator\": no relationship found between node 'master-0' and this object" logger="UnhandledError" Mar 18 09:57:52.535447 master-0 kubenswrapper[8244]: E0318 09:57:52.492168 8244 reflector.go:158] "Unhandled Error" err="object-\"openshift-machine-config-operator\"/\"openshift-service-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"openshift-service-ca.crt\" is forbidden: User \"system:node:master-0\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"openshift-machine-config-operator\": no relationship found between node 'master-0' and this object" logger="UnhandledError" Mar 18 09:57:52.535447 master-0 kubenswrapper[8244]: E0318 09:57:52.492205 8244 reflector.go:158] "Unhandled Error" err="object-\"openshift-operator-lifecycle-manager\"/\"packageserver-service-cert\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"packageserver-service-cert\" is forbidden: User \"system:node:master-0\" cannot list resource \"secrets\" in API group \"\" in the namespace \"openshift-operator-lifecycle-manager\": no relationship found between node 'master-0' and this object" logger="UnhandledError" Mar 18 09:57:52.535447 master-0 kubenswrapper[8244]: E0318 09:57:52.517711 8244 reflector.go:158] "Unhandled Error" err="object-\"openshift-machine-config-operator\"/\"kube-rbac-proxy\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-rbac-proxy\" is forbidden: User \"system:node:master-0\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"openshift-machine-config-operator\": no relationship found between node 'master-0' and this object" logger="UnhandledError" Mar 18 09:57:52.535447 master-0 kubenswrapper[8244]: E0318 09:57:52.517766 8244 reflector.go:158] "Unhandled Error" err="object-\"openshift-machine-config-operator\"/\"mco-proxy-tls\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"mco-proxy-tls\" is forbidden: User \"system:node:master-0\" cannot list resource \"secrets\" in API group \"\" in the namespace \"openshift-machine-config-operator\": no relationship found between node 'master-0' and this object" logger="UnhandledError" Mar 18 09:57:53.725691 master-0 kubenswrapper[8244]: E0318 09:57:53.725659 8244 configmap.go:193] Couldn't get configMap openshift-machine-config-operator/kube-rbac-proxy: failed to sync configmap cache: timed out waiting for the condition Mar 18 09:57:53.725770 master-0 kubenswrapper[8244]: E0318 09:57:53.725698 8244 secret.go:189] Couldn't get secret openshift-machine-config-operator/mco-proxy-tls: failed to sync secret cache: timed out waiting for the condition Mar 18 09:57:53.725770 master-0 kubenswrapper[8244]: E0318 09:57:53.725735 8244 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/2d014721-ed53-447a-b737-c496bbba18be-auth-proxy-config podName:2d014721-ed53-447a-b737-c496bbba18be nodeName:}" failed. No retries permitted until 2026-03-18 09:57:54.225715129 +0000 UTC m=+190.705451257 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "auth-proxy-config" (UniqueName: "kubernetes.io/configmap/2d014721-ed53-447a-b737-c496bbba18be-auth-proxy-config") pod "machine-config-operator-84d549f6d5-gnl5t" (UID: "2d014721-ed53-447a-b737-c496bbba18be") : failed to sync configmap cache: timed out waiting for the condition Mar 18 09:57:53.725891 master-0 kubenswrapper[8244]: E0318 09:57:53.725778 8244 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2d014721-ed53-447a-b737-c496bbba18be-proxy-tls podName:2d014721-ed53-447a-b737-c496bbba18be nodeName:}" failed. No retries permitted until 2026-03-18 09:57:54.2257546 +0000 UTC m=+190.705490718 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "proxy-tls" (UniqueName: "kubernetes.io/secret/2d014721-ed53-447a-b737-c496bbba18be-proxy-tls") pod "machine-config-operator-84d549f6d5-gnl5t" (UID: "2d014721-ed53-447a-b737-c496bbba18be") : failed to sync secret cache: timed out waiting for the condition Mar 18 09:57:53.773191 master-0 kubenswrapper[8244]: E0318 09:57:53.773164 8244 projected.go:288] Couldn't get configMap openshift-machine-config-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Mar 18 09:57:53.835172 master-0 kubenswrapper[8244]: E0318 09:57:53.835131 8244 projected.go:194] Error preparing data for projected volume kube-api-access-4btrk for pod openshift-machine-config-operator/machine-config-operator-84d549f6d5-gnl5t: failed to sync configmap cache: timed out waiting for the condition Mar 18 09:57:53.835302 master-0 kubenswrapper[8244]: E0318 09:57:53.835231 8244 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/2d014721-ed53-447a-b737-c496bbba18be-kube-api-access-4btrk podName:2d014721-ed53-447a-b737-c496bbba18be nodeName:}" failed. No retries permitted until 2026-03-18 09:57:54.335208794 +0000 UTC m=+190.814944932 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-4btrk" (UniqueName: "kubernetes.io/projected/2d014721-ed53-447a-b737-c496bbba18be-kube-api-access-4btrk") pod "machine-config-operator-84d549f6d5-gnl5t" (UID: "2d014721-ed53-447a-b737-c496bbba18be") : failed to sync configmap cache: timed out waiting for the conditionaggregated/ingress_controllers_certs.json0000640000000000000000000000045715156473473017552 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-18T09:55:14Z","not_after":"2028-03-17T09:55:15Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-18T09:55:17Z","not_after":"2028-03-17T09:55:18Z","controllers":[]}]config/clusteroperator/storage.json0000640000000000000000000000327615156473473016330 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"504830f6-e424-4f0d-bc5b-3fdc2065c1fb","resourceVersion":"11100","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"Unknown","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"NoData"},{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"NoData"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315156473473016675 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"f9f549f9-165f-4498-b1d7-95653d115641","resourceVersion":"4925","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:54:48Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:54:44Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:44Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000307715156473473024703 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"a9fb8f69-0d60-4ce7-a9e8-b14d37f63c6c","resourceVersion":"10118","generation":1,"creationTimestamp":"2026-03-18T09:47:52Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:55:33Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T09:55:33Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: NoOperatorGroup, message: csv in namespace with no operatorgroups"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T09:57:38Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:55:34Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255615156473473023474 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"8845a22d-04fe-41b4-b053-4de4cad98a26","resourceVersion":"10060","generation":1,"creationTimestamp":"2026-03-18T09:47:52Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:55:33Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:57:36Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:55:33Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:55:33Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115156473473022057 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"4d371b68-6f83-4b8c-bd10-fb784bbc5789","resourceVersion":"7005","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:55:33Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:55:33Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:55:33Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:55:33Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315156473473020321 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"914feef4-a004-4d4d-8ca9-d07f481ef9ee","resourceVersion":"820","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000426315156473473022451 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"9df8e2a4-3d4c-4839-8e2a-1885fab90fd8","resourceVersion":"6795","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:41Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T09:54:46Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T09:54:46Z","reason":"_NoPodsAvailable","message":"Available: no route controller manager deployment pods available on any node."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:46Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:54:41Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216315156473473020654 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"f89a2344-840f-406c-a891-70d2f67f49a6","resourceVersion":"10865","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:57:52Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T09:54:44Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:54:41Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"openshift-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415156473473015444 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"444f59b4-ecdc-4aff-aade-74860d960d44","resourceVersion":"6958","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:52Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:55:32Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:55:32Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:52Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:54:52Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115156473473017103 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"9b1748f0-b659-46bb-8653-d657c425b386","resourceVersion":"6677","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:55:17Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.35\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:55:18Z","reason":"AsExpected","message":"Cluster version is \"4.18.35\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:55:14Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003615415156473473016356 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"0cc1d822-dd05-43e0-9434-e2d3891502f1","resourceVersion":"7281","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-18T09:53:03Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:52:52Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:52:52Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:55:34Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:54:34Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-flatfile-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715156473473017047 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"5f50e008-a8b4-40ca-9685-db10e213e089","resourceVersion":"7080","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-18T09:55:33Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-18T09:55:33Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T09:55:33Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:55:33Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315156473473017144 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"7ae4248c-211f-42a2-ba55-2a585b7cd65a","resourceVersion":"7052","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:55:33Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.35"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:55:33Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:55:33Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:55:33Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015156473473017516 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"e7c95d71-40d1-45f4-a940-2a2baa73f449","resourceVersion":"798","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000253315156473473020117 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"bb2eb5e2-3d97-4848-8560-a8d103fc6feb","resourceVersion":"11064","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.35"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415156473473017034 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"e6b63c58-1559-4e1d-a8a1-5247a6c34d45","resourceVersion":"11072","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315156473473022554 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"0828e3a2-3cea-4388-8816-44b2a7b46bb3","resourceVersion":"5062","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:54:50Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:54:50Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:41Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:54:41Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615156473473017564 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"7f07727a-b4b4-4bb4-8479-37470dd08c00","resourceVersion":"7347","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T09:55:02Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715156473473021405 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"7886c3f1-d159-46ef-9522-9eecc35a5b28","resourceVersion":"7232","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:41Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T09:55:18Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T09:54:43Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:54:41Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715156473473017612 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"8dddae18-01ba-4cc8-bc13-cca6f0a245b3","resourceVersion":"6536","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:33Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T09:55:17Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T09:54:36Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:33Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-18T09:54:33Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000534115156473473016507 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"a8d79630-9ce2-439c-88a0-b7a9cd42d4f0","resourceVersion":"11089","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"Unknown","lastTransitionTime":"2026-03-18T09:58:18Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"Unknown","lastTransitionTime":"2026-03-18T09:58:18Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}config/clusteroperator/ingress.json0000640000000000000000000000467715156473473016344 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"44898dc4-cb5c-4a36-bc2e-a60d642dfdf6","resourceVersion":"10062","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:55:18Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T09:55:15Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:55:18Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:55:15Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-18T09:55:15Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-ingress-canary"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715156473473017607 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"df8d1936-b0ce-4da0-88cd-146b3b52fd53","resourceVersion":"700","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015156473473015601 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"941eb796-948f-463e-9b46-4bec4d6915f4","resourceVersion":"5625","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T09:55:02Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T09:54:43Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365615156473473015452 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"fcc9f72a-210d-4876-832a-dc876754e283","resourceVersion":"10686","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:57:52Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:57:52Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:57:52Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:55:07Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715156473473021453 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"4c2156fc-749f-4d16-b603-30dd37a16fef","resourceVersion":"5074","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:54:50Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:54:50Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"csi-snapshot-controller","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263615156473473021633 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"7a9396c3-8eab-4c35-ae2f-83d234c1f77e","resourceVersion":"11022","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215156473473016313 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"d51faef7-576f-420b-929c-b91de0438eb0","resourceVersion":"818","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615156473473017753 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"506988a9-28ca-49a2-8dec-34399c8094a0","resourceVersion":"4762","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:47Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:54:46Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:54:46Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:46Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:54:46Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000266015156473473020501 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"5dfd5c46-33eb-4ff7-85cb-5f2944e71e8b","resourceVersion":"11073","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"at version 4.18.35"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000001521715156473473020100 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"7da4fa62-0d6d-405d-9579-a0868e2f7cff","resourceVersion":"11098","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715156473473021563 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"6eae0687-5d6e-4378-902b-a03aad2d8936","resourceVersion":"830","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427115156473473016614 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"37d589f5-2355-413d-850c-e8df86b1305b","resourceVersion":"11035","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:58:18Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-18T09:58:18Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000735715156473473017707 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"67655774-a359-44a8-80e6-02edc4e21d5b","resourceVersion":"6724","generation":1,"creationTimestamp":"2026-03-18T09:47:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.55.232:443/healthz\": dial tcp 172.30.55.232:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T09:55:07Z","reason":"APIServerDeployment_PodsUpdating","message":"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"APIServerDeployment_NoPod::APIServices_PreconditionNotReady::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: PreconditionNotReady\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.55.232:443/healthz\": dial tcp 172.30.55.232:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T09:54:41Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/running_containers.json0000640000000000000000000000710715156473473015331 0ustar0000000000000000{"images":{"0":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","1":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","10":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","11":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","12":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","13":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","14":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","15":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","16":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","17":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","18":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","19":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","2":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","20":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","21":"registry.redhat.io/redhat/certified-operator-index:v4.18","22":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","23":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","24":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","25":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","26":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","27":"sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","28":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","29":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","3":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","30":"registry.redhat.io/redhat/community-operator-index:v4.18","31":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","32":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","33":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","34":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","35":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","36":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","37":"registry.redhat.io/redhat/redhat-operator-index:v4.18","38":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","39":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","4":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","40":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","41":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","42":"sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","5":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","6":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","7":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","8":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","9":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"},"containers":{"2026-03":{"0":11,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":1,"19":1,"2":8,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":5,"40":1,"41":1,"42":1,"5":4,"6":2,"7":2,"8":2,"9":2}}}config/pod/openshift-service-ca-operator/service-ca-operator-b865698dc-pgtbr.json0000640000000000000000000001561615156473473026307 0ustar0000000000000000{"metadata":{"name":"service-ca-operator-b865698dc-pgtbr","generateName":"service-ca-operator-b865698dc-","namespace":"openshift-service-ca-operator","uid":"bb35841e-d992-4044-aaaa-06c9faf47bd0","resourceVersion":"10297","creationTimestamp":"2026-03-18T09:52:42Z","labels":{"app":"service-ca-operator","pod-template-hash":"b865698dc"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.19/23\"],\"mac_address\":\"0a:58:0a:80:00:13\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.19/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.19\"\n ],\n \"mac\": \"0a:58:0a:80:00:13\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"service-ca-operator-b865698dc","uid":"edc06746-39fb-48cc-85e1-bf1dbd6b51ce","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"service-ca-operator-config","defaultMode":420}},{"name":"kube-api-access-zlxfz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"service-ca-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","command":["service-ca-operator","operator"],"args":["--config=/var/run/configmaps/config/operator-config.yaml","-v=2"],"env":[{"name":"CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"}],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-zlxfz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"service-ca-operator","serviceAccount":"service-ca-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c12"},"runAsUser":1001,"runAsGroup":1001,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.19","podIPs":[{"ip":"10.128.0.19"}],"startTime":"2026-03-18T09:54:21Z","containerStatuses":[{"name":"service-ca-operator","state":{"running":{"startedAt":"2026-03-18T09:57:43Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 09:56:55.871393 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 09:56:55.871497 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 09:56:55.871963 1 observer_polling.go:159] Starting file observer\nI0318 09:56:55.872443 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0318 09:56:55.872456 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0318 09:56:55.920670 1 builder.go:304] service-ca-operator version -\nI0318 09:56:55.921948 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nI0318 09:57:29.569950 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController\nF0318 09:57:29.570124 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-03-18T09:56:55Z","finishedAt":"2026-03-18T09:57:29Z","containerID":"cri-o://76f59e21155c1d71669d55451f86d8b5a3fe790b476c844c6bc57c22a2e68f76"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","containerID":"cri-o://d49c249df3f862614187a3b820449471cb0684b53fb2bc542b281bed1f3be2fd","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-zlxfz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-7bd846bfc4-8srnz.json0000640000000000000000000002250315156473473025601 0ustar0000000000000000{"metadata":{"name":"network-operator-7bd846bfc4-8srnz","generateName":"network-operator-7bd846bfc4-","namespace":"openshift-network-operator","uid":"9ccdc221-4ec5-487e-8ec4-85284ed628d8","resourceVersion":"10301","creationTimestamp":"2026-03-18T09:52:41Z","labels":{"name":"network-operator","pod-template-hash":"7bd846bfc4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7bd846bfc4","uid":"b718daa9-df9a-42d9-a99e-a3b293bed4ff","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-ghd2r","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:02f0aa65dfd2a58e13248b4e2078caec450fa2bdbacb3afeb34d1de30c909b0f"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:896642a5bdda0cdbeccb0293d3de85f8882ac72678df8d12fb501fd3367982af"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b6140aa21678d5652c4d09e21eab5dfad35af30902b705c70f72a384e43868ac"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da26695a0ab94eddc0841bf2ed51b30921e2cdc2a9a5acd0d951081de67f1a97"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a22978e1669cdbaeee6ec0800f83559b56a2344f1c003f8cd60f27fac939680e"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-ghd2r","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:52:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:52:42Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:52:42Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T09:52:42Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-18T09:57:44Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 09:56:56.303319 1 cmd.go:250] Using service-serving-cert provided certificates\nI0318 09:56:56.303451 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 09:56:56.304358 1 observer_polling.go:159] Starting file observer\nI0318 09:56:56.331972 1 builder.go:298] network-operator version 4.18.0-202603040549.p2.g8df9d04.assembly.stream.el9-8df9d04-8df9d04f3019ff6e0a4c51504601e8a73b4322e3\nF0318 09:57:29.597897 1 cmd.go:179] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-03-18T09:56:56Z","finishedAt":"2026-03-18T09:57:29Z","containerID":"cri-o://b5bf205c4d2d39a65c5f434aca2db07e6f6c44b756c420c12726c015f7a4b2e6"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","containerID":"cri-o://d104795039a77eee9eb4fddfb0911cce88afaee884dd9159c6ea0d77b9f36476","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-ghd2r","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-7fl4x.json0000640000000000000000000002466115156473473025657 0ustar0000000000000000{"metadata":{"name":"network-node-identity-7fl4x","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"bb942756-bac7-414d-b179-cebdce588a13","resourceVersion":"8155","creationTimestamp":"2026-03-18T09:53:31Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"5d8cf8bd5d","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"1357aa86-e184-4c79-aaad-1d0823eb30a9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-2ktpl","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-2ktpl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-2ktpl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:53:44Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:53:31Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:56:57Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:56:57Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:53:31Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T09:53:31Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-18T09:56:55Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-2tzwf\"} reason=\"CSRApproved\"\nI0318 09:54:13.466185 1 approver.go:230] Finished syncing CSR csr-2tzwf for master-0 node in 26.135229ms\nI0318 09:54:13.466382 1 approver.go:230] Finished syncing CSR csr-2tzwf for unknown node in 114.153µs\nI0318 09:54:13.478848 1 approver.go:230] Finished syncing CSR csr-2tzwf for unknown node in 69.382µs\nE0318 09:56:02.937551 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0318 09:56:17.938196 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nI0318 09:56:17.938258 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0318 09:56:32.938801 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0318 09:56:32.939025 1 ovnkubeidentity.go:309] error running approver: leader election lost\nI0318 09:56:32.939040 1 recorder.go:104] \"master-0_d94ba444-77ea-4d3d-800d-f3490272c447 stopped leading\" logger=\"events\" type=\"Normal\" object={\"kind\":\"Lease\",\"namespace\":\"openshift-network-node-identity\",\"name\":\"ovnkube-identity\",\"uid\":\"5b9fd4a1-1321-4437-a970-dbc7109e40fc\",\"apiVersion\":\"coordination.k8s.io/v1\",\"resourceVersion\":\"6859\"} reason=\"LeaderElection\"\n","startedAt":"2026-03-18T09:53:43Z","finishedAt":"2026-03-18T09:56:32Z","containerID":"cri-o://11b5b6c3c569b883f4e3bfd269fb3345429d4cace9fc05301ab08ee60a18aa95"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://8009f4f9bf68efb70bfa7b66731f5e2be25cbb5d97d4aeafc6a4a27c0d88d49e","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-2ktpl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-18T09:53:41Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://59a8b56b2c5b54ef9ce1252e4c00aeb3ab2ee3eaf825a3df0fbff0f1e980170f","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-2ktpl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-multus/multus-xgdvw.json0000640000000000000000000002116415156473473020221 0ustar0000000000000000{"metadata":{"name":"multus-xgdvw","generateName":"multus-","namespace":"openshift-multus","uid":"03de1ea6-da57-4e13-8e5a-d5e10a9f9957","resourceVersion":"3469","creationTimestamp":"2026-03-18T09:53:03Z","labels":{"app":"multus","component":"network","controller-revision-hash":"7765857f57","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"cluster-autoscaler.kubernetes.io/enable-ds-eviction":"false"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"multus","uid":"e289aa6c-b4f6-49b3-b948-85a0b627b0ac","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"system-cni-dir","hostPath":{"path":"/etc/kubernetes/cni/net.d","type":"Directory"}},{"name":"multus-cni-dir","hostPath":{"path":"/var/run/multus/cni/net.d","type":"Directory"}},{"name":"cnibin","hostPath":{"path":"/var/lib/cni/bin","type":"Directory"}},{"name":"os-release","hostPath":{"path":"/etc/os-release","type":"File"}},{"name":"cni-binary-copy","configMap":{"name":"cni-copy-resources","defaultMode":484}},{"name":"multus-socket-dir-parent","hostPath":{"path":"/run/multus","type":"DirectoryOrCreate"}},{"name":"host-run-k8s-cni-cncf-io","hostPath":{"path":"/run/k8s.cni.cncf.io","type":""}},{"name":"host-run-netns","hostPath":{"path":"/run/netns/","type":""}},{"name":"host-var-lib-cni-bin","hostPath":{"path":"/var/lib/cni/bin","type":""}},{"name":"host-var-lib-cni-multus","hostPath":{"path":"/var/lib/cni/multus","type":""}},{"name":"host-var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}},{"name":"hostroot","hostPath":{"path":"/","type":""}},{"name":"multus-conf-dir","hostPath":{"path":"/etc/cni/multus/net.d","type":""}},{"name":"multus-daemon-config","configMap":{"name":"multus-daemon-config","items":[{"key":"daemon-config.json","path":"daemon-config.json"}],"defaultMode":420}},{"name":"host-run-multus-certs","hostPath":{"path":"/etc/cni/multus/certs","type":""}},{"name":"etc-kubernetes","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"kube-api-access-hcj8f","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-multus","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","command":["/bin/bash","-ec","--"],"args":["MULTUS_DAEMON_OPT=\"\"\n/entrypoint/cnibincopy.sh; exec /usr/src/multus-cni/bin/multus-daemon $MULTUS_DAEMON_OPT\n"],"env":[{"name":"RHEL8_SOURCE_DIRECTORY","value":"/usr/src/multus-cni/rhel8/bin/"},{"name":"RHEL9_SOURCE_DIRECTORY","value":"/usr/src/multus-cni/rhel9/bin/"},{"name":"DEFAULT_SOURCE_DIRECTORY","value":"/usr/src/multus-cni/bin/"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"MULTUS_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"K8S_NODE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"65Mi"}},"volumeMounts":[{"name":"cni-binary-copy","mountPath":"/entrypoint"},{"name":"os-release","mountPath":"/host/etc/os-release"},{"name":"system-cni-dir","mountPath":"/host/etc/cni/net.d"},{"name":"multus-cni-dir","mountPath":"/host/run/multus/cni/net.d"},{"name":"cnibin","mountPath":"/host/opt/cni/bin"},{"name":"multus-socket-dir-parent","mountPath":"/host/run/multus","mountPropagation":"HostToContainer"},{"name":"host-run-k8s-cni-cncf-io","mountPath":"/run/k8s.cni.cncf.io"},{"name":"host-run-netns","mountPath":"/run/netns","mountPropagation":"HostToContainer"},{"name":"host-var-lib-cni-bin","mountPath":"/var/lib/cni/bin"},{"name":"host-var-lib-cni-multus","mountPath":"/var/lib/cni/multus"},{"name":"host-var-lib-kubelet","mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"},{"name":"hostroot","mountPath":"/hostroot","mountPropagation":"HostToContainer"},{"name":"multus-conf-dir","mountPath":"/etc/cni/multus/net.d"},{"name":"multus-daemon-config","readOnly":true,"mountPath":"/etc/cni/net.d/multus.d"},{"name":"host-run-multus-certs","mountPath":"/etc/cni/multus/certs"},{"name":"etc-kubernetes","mountPath":"/etc/kubernetes"},{"name":"kube-api-access-hcj8f","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"default","serviceAccount":"default","nodeName":"master-0","hostNetwork":true,"hostPID":true,"securityContext":{},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:53:16Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:53:03Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:02Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:02Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:53:03Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T09:53:03Z","containerStatuses":[{"name":"kube-multus","state":{"running":{"startedAt":"2026-03-18T09:54:01Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"2026-03-18T09:53:16+00:00 [cnibincopy] Successfully copied files in /usr/src/multus-cni/rhel9/bin/ to /host/opt/cni/bin/upgrade_f067e5b9-5a62-433d-b3d8-eb1827321779\n2026-03-18T09:53:16+00:00 [cnibincopy] Successfully moved files in /host/opt/cni/bin/upgrade_f067e5b9-5a62-433d-b3d8-eb1827321779 to /host/opt/cni/bin/\n2026-03-18T09:53:16Z [verbose] multus-daemon started\n2026-03-18T09:53:16Z [verbose] Readiness Indicator file check\n2026-03-18T09:54:01Z [error] have you checked that your default network is ready? still waiting for readinessindicatorfile @ /host/run/multus/cni/net.d/10-ovn-kubernetes.conf. pollimmediate error: timed out waiting for the condition\n","startedAt":"2026-03-18T09:53:16Z","finishedAt":"2026-03-18T09:54:01Z","containerID":"cri-o://2da220e2852846e9b471d19bf3329629d81b1d881746691dfdddb60fd750adba"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","containerID":"cri-o://7bf2c15191632567ded0f0a0cc42398e46b8b62c68e8abd9d189eb8b0b493d1c","started":true,"volumeMounts":[{"name":"cni-binary-copy","mountPath":"/entrypoint"},{"name":"os-release","mountPath":"/host/etc/os-release"},{"name":"system-cni-dir","mountPath":"/host/etc/cni/net.d"},{"name":"multus-cni-dir","mountPath":"/host/run/multus/cni/net.d"},{"name":"cnibin","mountPath":"/host/opt/cni/bin"},{"name":"multus-socket-dir-parent","mountPath":"/host/run/multus"},{"name":"host-run-k8s-cni-cncf-io","mountPath":"/run/k8s.cni.cncf.io"},{"name":"host-run-netns","mountPath":"/run/netns"},{"name":"host-var-lib-cni-bin","mountPath":"/var/lib/cni/bin"},{"name":"host-var-lib-cni-multus","mountPath":"/var/lib/cni/multus"},{"name":"host-var-lib-kubelet","mountPath":"/var/lib/kubelet"},{"name":"hostroot","mountPath":"/hostroot"},{"name":"multus-conf-dir","mountPath":"/etc/cni/multus/net.d"},{"name":"multus-daemon-config","mountPath":"/etc/cni/net.d/multus.d","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"host-run-multus-certs","mountPath":"/etc/cni/multus/certs"},{"name":"etc-kubernetes","mountPath":"/etc/kubernetes"},{"name":"kube-api-access-hcj8f","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215156473473026271 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"ce8c3bb4-cbf2-4091-8631-cf72e85b52ce","resourceVersion":"4625","creationTimestamp":"2026-03-18T09:52:46Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.mirror":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.seen":"2026-03-18T09:51:56.900039622Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"673840ad-4cc8-4ca9-8d21-07b73732aba5","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:44Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:44Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:44Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:44Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:44Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T09:54:44Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T09:52:11Z","finishedAt":"2026-03-18T09:52:11Z","containerID":"cri-o://a88536111853576d542216418fa9e6a7c0a796244d77dbfb3568461d1ad235ad"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://a88536111853576d542216418fa9e6a7c0a796244d77dbfb3568461d1ad235ad","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-18T09:52:58Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0318 09:52:30.429044 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0318 09:52:30.429186 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0318 09:52:30.430575 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-18T09:52:30Z","finishedAt":"2026-03-18T09:52:30Z","containerID":"cri-o://d2de72527ed6923a5ffc8e75d557ea5b2e3fbc7f0f250aeb34b97b6d6a4b673b"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://b4356aff744ddd84b751a19b6b1c926a7d4c3a2ecf0278ac7c42e1a78ef7db64","started":true}],"qosClass":"Burstable"}}kube-storage-version-migrator-operator-6bb5bfb6fd-lk698.json0000640000000000000000000001554215156473473036063 0ustar0000000000000000config/pod/openshift-kube-storage-version-migrator-operator{"metadata":{"name":"kube-storage-version-migrator-operator-6bb5bfb6fd-lk698","generateName":"kube-storage-version-migrator-operator-6bb5bfb6fd-","namespace":"openshift-kube-storage-version-migrator-operator","uid":"ec53d7fa-445b-4e1d-84ef-545f08e80ccc","resourceVersion":"10257","creationTimestamp":"2026-03-18T09:52:40Z","labels":{"app":"kube-storage-version-migrator-operator","pod-template-hash":"6bb5bfb6fd"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.21/23\"],\"mac_address\":\"0a:58:0a:80:00:15\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.21/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.21\"\n ],\n \"mac\": \"0a:58:0a:80:00:15\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-storage-version-migrator-operator-6bb5bfb6fd","uid":"e955a66a-c180-4ab0-92f2-a1d3680715e5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"kube-api-access-wj9sq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-storage-version-migrator-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","command":["cluster-kube-storage-version-migrator-operator","start"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-wj9sq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1001,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-storage-version-migrator-operator","serviceAccount":"kube-storage-version-migrator-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c19,c9"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:43Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.21","podIPs":[{"ip":"10.128.0.21"}],"startTime":"2026-03-18T09:54:21Z","containerStatuses":[{"name":"kube-storage-version-migrator-operator","state":{"running":{"startedAt":"2026-03-18T09:57:42Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 09:56:56.011657 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 09:56:56.011773 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 09:56:56.015029 1 observer_polling.go:159] Starting file observer\nI0318 09:56:56.033646 1 builder.go:304] openshift-kube-storage-version-migrator-operator version 4.18.0-202602261953.p2.g59ba356.assembly.stream.el9-59ba356-59ba356f50ea3128905ffdb7137f868aa0588bab\nF0318 09:57:29.570928 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-03-18T09:56:55Z","finishedAt":"2026-03-18T09:57:29Z","containerID":"cri-o://100b826fb47409f3adda82931968130591dc6b1e7420f5ccfd2ef57c6281504c"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","containerID":"cri-o://ab9a533206bf10cbc0086475add5139b53093ab44226d73893369fd1ba1ed0a0","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-wj9sq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-66b84d69b-kr5kz.json0000640000000000000000000002430615156473473025311 0ustar0000000000000000{"metadata":{"name":"ingress-operator-66b84d69b-kr5kz","generateName":"ingress-operator-66b84d69b-","namespace":"openshift-ingress-operator","uid":"accc57fb-75f5-4f89-9804-6ede7f77e27c","resourceVersion":"9380","creationTimestamp":"2026-03-18T09:52:40Z","labels":{"name":"ingress-operator","pod-template-hash":"66b84d69b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.14/23\"],\"mac_address\":\"0a:58:0a:80:00:0e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.14/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.14\"\n ],\n \"mac\": \"0a:58:0a:80:00:0e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-66b84d69b","uid":"91fa01af-2289-41c6-8409-042fb51b9602","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-nwfph","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-nwfph","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-nwfph","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:15Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:18Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:18Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.14","podIPs":[{"ip":"10.128.0.14"}],"startTime":"2026-03-18T09:54:21Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-18T09:57:17Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":" on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0318 09:57:16.432001 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DNSRecord ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0318 09:57:16.432121 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.IngressClass ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0318 09:57:16.432203 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DaemonSet ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0318 09:57:16.432250 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.RoleBinding ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0318 09:57:16.432307 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.FeatureGate ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-18T09:57:16.432Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-03-18T09:57:16.433Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-03-18T09:57:16.437Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2026-03-18T09:55:14Z","finishedAt":"2026-03-18T09:57:16Z","containerID":"cri-o://206825c3b2d516109311b9ec6547c75a5e9979c7b55c567cf556284de0799148"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","containerID":"cri-o://8be1e41fb91899198366216500a2564664d7ef8ef90cbe9f4c1e19358a42df09","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-nwfph","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-18T09:55:14Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://05cff4221243ebd7ae26153c89c1fdb47cc0832d0d0994dde3cdc704bcd74a3b","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-nwfph","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-config-operator/openshift-config-operator-95bf4f4d-495pg.json0000640000000000000000000002152215156473473026464 0ustar0000000000000000{"metadata":{"name":"openshift-config-operator-95bf4f4d-495pg","generateName":"openshift-config-operator-95bf4f4d-","namespace":"openshift-config-operator","uid":"0ed4e3d9-be0c-435a-82d7-5d2fa7b6d480","resourceVersion":"9807","creationTimestamp":"2026-03-18T09:52:38Z","labels":{"app":"openshift-config-operator","pod-template-hash":"95bf4f4d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-config-operator-95bf4f4d","uid":"dbd6a298-9b64-4341-b32c-e9c8f309d582","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"config-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"available-featuregates","emptyDir":{"sizeLimit":"100Mi"}},{"name":"kube-api-access-9fjk8","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"openshift-api","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","command":["write-available-featuresets","--asset-output-dir=/available-featuregates","--payload-version=$(OPERATOR_IMAGE_VERSION)"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-9fjk8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"containers":[{"name":"openshift-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","command":["cluster-config-operator","operator","--operator-version=$(OPERATOR_IMAGE_VERSION)","--authoritative-feature-gate-dir=/available-featuregates"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-9fjk8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-config-operator","serviceAccount":"openshift-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:40Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:33Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:57:33Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:54:21Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2026-03-18T09:54:21Z","initContainerStatuses":[{"name":"openshift-api","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T09:54:40Z","finishedAt":"2026-03-18T09:54:40Z","containerID":"cri-o://981f5359f2b3c5ba98385487e0fffb3f9c331fb34bb0e106e475367f63bb51f9"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","containerID":"cri-o://981f5359f2b3c5ba98385487e0fffb3f9c331fb34bb0e106e475367f63bb51f9","started":false,"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-9fjk8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"openshift-config-operator","state":{"running":{"startedAt":"2026-03-18T09:57:30Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 09:56:30.692091 1 cmd.go:250] Using service-serving-cert provided certificates\nI0318 09:56:30.692356 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 09:56:30.693011 1 observer_polling.go:159] Starting file observer\nI0318 09:56:55.472452 1 builder.go:298] config-operator version 4.18.0-202602261953.p2.gfe5e928.assembly.stream.el9-fe5e928-fe5e928628200b49a07aa50e4dfa634fb9452607\nI0318 09:57:02.697377 1 cmd.go:138] Received SIGTERM or SIGINT signal, shutting down controller.\nI0318 09:57:05.693808 1 observer_polling.go:162] Shutting down file observer\nF0318 09:57:29.569882 1 cmd.go:179] failed checking connectivity: client rate limiter Wait returned an error: context canceled\n","startedAt":"2026-03-18T09:56:30Z","finishedAt":"2026-03-18T09:57:29Z","containerID":"cri-o://7d07e8c06ddf9d3c29ebaf294b7a205901752e302793187eb4f8dcbb44b41fc0"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","containerID":"cri-o://28649efad05eac5b0f41333b14d359f00b8f30fb75f4db907f9a07ca5b91b9da","started":true,"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-9fjk8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515156473473023234 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115156473473025444 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715156473473025153 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715156473473025144 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000040415156473473022266 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515156473473026720 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115156473473023423 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115156473473023217 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115156473473025507 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/machineconfigpools/worker.json0000640000000000000000000000106615156473473016602 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-18T09:57:56Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10880","uid":"5c765acf-65c0-4b85-a97a-372df3fc687b"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117315156473473016563 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-18T09:57:56Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10879","uid":"ca4d0915-adbd-403e-b586-952b5d4e74e3"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315156473473023461 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"5981b019-17dc-494d-aa32-9c1d4d7800e2","resourceVersion":"4245","generation":1,"creationTimestamp":"2026-03-18T09:54:42Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015156473473022064 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"01efc5e7-ad79-4ed2-b4ba-7d2e54c563f1","resourceVersion":"4224","generation":1,"creationTimestamp":"2026-03-18T09:54:42Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-18T09:54:42Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115156473473025313 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"4ca65829-ba00-4cb1-bab0-c0d3c44938af","resourceVersion":"4857","generation":2,"creationTimestamp":"2026-03-18T09:48:19Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515156473473026752 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"f98d2668-f183-47bb-80ff-063cd1b260a0","resourceVersion":"6865","generation":1,"creationTimestamp":"2026-03-18T09:55:27Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"de550c1c-97fa-41bf-b0f4-7ff4deb7591c","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715156473473024040 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"4155a579-e1e1-4387-b697-7d1da7218f2b","resourceVersion":"4856","generation":2,"creationTimestamp":"2026-03-18T09:53:06Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"de550c1c-97fa-41bf-b0f4-7ff4deb7591c","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500215156473473032124 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"dcd95ed6-7811-43c3-a92d-1c80b5c0aeae","resourceVersion":"11039","generation":2,"creationTimestamp":"2026-03-18T09:58:18Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715156473473025011 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"18cb9565-7e25-492f-a298-a50cb9cf4cc9","resourceVersion":"11049","generation":2,"creationTimestamp":"2026-03-18T09:58:18Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173615156473473025140 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"1e0d279a-e341-49f4-a5d1-c60e88d4a537","resourceVersion":"10897","generation":1,"creationTimestamp":"2026-03-18T09:48:09Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-18T09:57:56Z","reason":"SufficientPods","message":""}]}}config/pod/openshift-cluster-version/cluster-version-operator-7d58488df-9nd2s.json0000640000000000000000000001341415156473473026542 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-7d58488df-9nd2s","generateName":"cluster-version-operator-7d58488df-","namespace":"openshift-cluster-version","uid":"432f611b-a1a2-4cc9-b005-17a16413d281","resourceVersion":"7393","creationTimestamp":"2026-03-18T09:55:33Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"7d58488df"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-7d58488df","uid":"d1c2d6b1-e219-4ff4-b5d1-5da8bc61ebf8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:34Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:33Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T09:55:33Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T09:55:33Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-18T09:55:34Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","containerID":"cri-o://fd996d8153064578e39564038db6d922a85643610cafc41bae9a4fe71acf8389","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415156473473011041 0ustar0000000000000000ee39cefe-9123-4126-9b04-bfaa261a8acdconfig/version.json0000640000000000000000000000725115156473473013111 0ustar0000000000000000{"metadata":{"name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e","resourceVersion":"10991","generation":2,"creationTimestamp":"2026-03-18T09:47:29Z"},"spec":{"clusterID":"ee39cefe-9123-4126-9b04-bfaa261a8acd","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","url":"https://access.redhat.com/errata/RHSA-2026:3905","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-18T09:47:51Z","completionTime":null,"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","verified":false}],"observedGeneration":2,"versionHash":"Uw6h6T7stl0=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-18T09:47:51Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-18T09:47:51Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-18T09:47:51Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-18T09:47:51Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T09:47:51Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-18T09:57:38Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, baremetal, cloud-controller-manager, cloud-credential, cluster-autoscaler, control-plane-machine-set, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, machine-config, monitoring, openshift-apiserver, openshift-controller-manager, openshift-samples, operator-lifecycle-manager-packageserver, storage are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T09:47:51Z","reason":"MultipleErrors","message":"Unable to apply 4.18.35: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}aggregated/unused_machine_configs_count.json0000640000000000000000000000004115156473473020146 0ustar0000000000000000{"unused_machineconfigs_count":9}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215715156473473025520 0ustar0000000000000000{"metadata":{"name":"edit","uid":"900ee6d0-54a7-4ea7-ade2-85602534d96b","resourceVersion":"10517","creationTimestamp":"2026-03-18T09:46:30Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504415156473473025661 0ustar0000000000000000{"metadata":{"name":"admin","uid":"c61629d6-fef1-479c-8641-a7cfc0816eb8","resourceVersion":"10549","creationTimestamp":"2026-03-18T09:46:30Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615156473473027515 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"2529b3b2-bbfa-49e3-b469-e942117920cd","resourceVersion":"6154","generation":2,"creationTimestamp":"2026-03-18T09:55:08Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215156473473020213 0ustar0000000000000000[]config/apiserver.json0000640000000000000000000000121615156473473013417 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"64fcd750-9a76-4983-827e-2fee224d2566","resourceVersion":"943","generation":1,"creationTimestamp":"2026-03-18T09:47:54Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/ingress.json0000640000000000000000000000043615156473473013074 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"783ce1d6-aaa5-4cd1-93cc-dd038c980026","resourceVersion":"565","generation":1,"creationTimestamp":"2026-03-18T09:47:24Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/image.json0000640000000000000000000000111715156473473012501 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"9570b708-fbf6-4557-ad60-c15bcc1f7256","resourceVersion":"1577","generation":1,"creationTimestamp":"2026-03-18T09:48:08Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/schedulers/cluster.json0000640000000000000000000000052415156473473015242 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"67e96c0c-3171-43ca-a20a-588a956ebfd8","resourceVersion":"575","generation":1,"creationTimestamp":"2026-03-18T09:47:27Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/featuregate.json0000640000000000000000000000613615156473473013721 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"fd5b4243-d0e5-4f91-9241-5b6f45809883","resourceVersion":"651","generation":1,"creationTimestamp":"2026-03-18T09:47:46Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.35","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/proxy.json0000640000000000000000000000031315156473473012575 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"10b533ba-ee3d-428f-9121-7732236eb40a","resourceVersion":"568","generation":1,"creationTimestamp":"2026-03-18T09:47:25Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/node/master-0.json0000640000000000000000000000544615156473473014005 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"673840ad-4cc8-4ca9-8d21-07b73732aba5","resourceVersion":"9559","creationTimestamp":"2026-03-18T09:52:37Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865356Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714380Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-18T09:57:25Z","lastTransitionTime":"2026-03-18T09:52:37Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-18T09:57:25Z","lastTransitionTime":"2026-03-18T09:52:37Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-18T09:57:25Z","lastTransitionTime":"2026-03-18T09:52:37Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-18T09:57:25Z","lastTransitionTime":"2026-03-18T09:54:21Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.113.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202603021444-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/oauth.json0000640000000000000000000000114415156473473012537 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"c633bb27-83aa-4d5c-ab27-1e00e247b664","resourceVersion":"1702","generation":1,"creationTimestamp":"2026-03-18T09:48:11Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115156473473027765 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0cc77565-8fb2-40a4-8884-8e0a072618cb","resourceVersion":"6422","generation":1,"creationTimestamp":"2026-03-18T09:55:14Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T09:55:15Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-18T09:55:15Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-18T09:55:15Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T09:55:15Z","reason":"AsExpected"}]}}config/authentication.json0000640000000000000000000000116515156473473014441 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"2bade83b-57d4-4f06-9b24-661529d9a5f0","resourceVersion":"1176","generation":1,"creationTimestamp":"2026-03-18T09:48:00Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"11b1a6eb-d02d-4d03-9796-035325ff7e5e"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/infrastructure.json0000640000000000000000000000106515156473473014501 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"a6c01530-204b-481a-babe-214093507116","resourceVersion":"551","generation":1,"creationTimestamp":"2026-03-18T09:47:23Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/network.json0000640000000000000000000000117015156473473013107 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"83079538-6903-4e7b-a448-ad2cbff4dbe5","resourceVersion":"3252","generation":2,"creationTimestamp":"2026-03-18T09:47:25Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}