insights-operator/gathers.json0000640000000000000000000004462515156522265015275 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/storage_classes","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":18,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":64,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":8,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":9,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":20,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":107,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":8,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":10,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":87,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5733,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":30,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":39,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":16,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":26,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":9,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":23,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":10,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":22,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":43,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":76,"records_count":14,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":7,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":9,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":17,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":875,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":7,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":77,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10831,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":25,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":75,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":9,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5732,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":164,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":38,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":19877,"records_count":168,"errors":["function \"tsdb_status\" failed with an error","function \"active_alerts\" failed with an error","function \"silenced_alerts\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"machine_autoscalers\" failed with an error","function \"metrics\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-n7fn4.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-jx4mf.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-jx4mf/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-jx4mf/etcd-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-cpqm5.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-t84s9.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-lifecycle-manager/packageserver-ff75f747c-r46tm.json\""],"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11603,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":6,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":18,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":19865,"records_count":71,"errors":["the record with the same name \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-n7fn4.json\" was already recorded and had the fingerprint \"3e7ae1532a968e77c8b8c557933721f40e53a29248ed825152509b75c059e082\", overwriting with the record having fingerprint \"3e7ae1532a968e77c8b8c557933721f40e53a29248ed825152509b75c059e082\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-jx4mf.json\" was already recorded and had the fingerprint \"8404d4b57cb5ec47bd58c0f6cbb3d2d21fa5c6ec882a0ee2c7de0929e558826a\", overwriting with the record having fingerprint \"8404d4b57cb5ec47bd58c0f6cbb3d2d21fa5c6ec882a0ee2c7de0929e558826a\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-jx4mf/etcd-operator_previous.log\" was already recorded and had the fingerprint \"e6929dfbf438a010a746b5cb12d564d84f6338c2de9d30c85f83d18cf0d7ef91\", overwriting with the record having fingerprint \"e6929dfbf438a010a746b5cb12d564d84f6338c2de9d30c85f83d18cf0d7ef91\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-jx4mf/etcd-operator_current.log\" was already recorded and had the fingerprint \"2494b8d1c072729c34f8beb84d50b86e70aa7151e6872d41006134fa6cb12c03\", overwriting with the record having fingerprint \"2494b8d1c072729c34f8beb84d50b86e70aa7151e6872d41006134fa6cb12c03\"","the record with the same name \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-cpqm5.json\" was already recorded and had the fingerprint \"875414930aa0f890a1b8c44726a429d1b2e0b53272a6c259052a24932d1485e8\", overwriting with the record having fingerprint \"875414930aa0f890a1b8c44726a429d1b2e0b53272a6c259052a24932d1485e8\"","the record with the same name \"config/pod/openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-t84s9.json\" was already recorded and had the fingerprint \"24558ec08a7347fe008e6a2d43cc22603429429ad79aab6ced5d65c8d5453fe9\", overwriting with the record having fingerprint \"24558ec08a7347fe008e6a2d43cc22603429429ad79aab6ced5d65c8d5453fe9\"","the record with the same name \"config/pod/openshift-operator-lifecycle-manager/packageserver-ff75f747c-r46tm.json\" was already recorded and had the fingerprint \"d6d5df57bb9d9c91af8bdbc69a60e0a83683e05e163cc210e118ed420a8ffa35\", overwriting with the record having fingerprint \"d6d5df57bb9d9c91af8bdbc69a60e0a83683e05e163cc210e118ed420a8ffa35\""],"warnings":["warning: the record with the same fingerprint \"3e7ae1532a968e77c8b8c557933721f40e53a29248ed825152509b75c059e082\" was already recorded at path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-n7fn4.json\", recording another one with a different path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-n7fn4.json\"","warning: the record with the same fingerprint \"8404d4b57cb5ec47bd58c0f6cbb3d2d21fa5c6ec882a0ee2c7de0929e558826a\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-jx4mf.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-jx4mf.json\"","warning: the record with the same fingerprint \"e6929dfbf438a010a746b5cb12d564d84f6338c2de9d30c85f83d18cf0d7ef91\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-jx4mf/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-jx4mf/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"2494b8d1c072729c34f8beb84d50b86e70aa7151e6872d41006134fa6cb12c03\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-jx4mf/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-jx4mf/etcd-operator_current.log\"","warning: the record with the same fingerprint \"875414930aa0f890a1b8c44726a429d1b2e0b53272a6c259052a24932d1485e8\" was already recorded at path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-cpqm5.json\", recording another one with a different path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-cpqm5.json\"","warning: the record with the same fingerprint \"24558ec08a7347fe008e6a2d43cc22603429429ad79aab6ced5d65c8d5453fe9\" was already recorded at path \"config/pod/openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-t84s9.json\", recording another one with a different path \"config/pod/openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-t84s9.json\"","warning: the record with the same fingerprint \"d6d5df57bb9d9c91af8bdbc69a60e0a83683e05e163cc210e118ed420a8ffa35\" was already recorded at path \"config/pod/openshift-operator-lifecycle-manager/packageserver-ff75f747c-r46tm.json\", recording another one with a different path \"config/pod/openshift-operator-lifecycle-manager/packageserver-ff75f747c-r46tm.json\""],"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":10,"records_count":8,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":41,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":47,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":27.51,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515156522264017772 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515156522264021074 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005524115156522264014254 0ustar0000000000000000{"pods":81,"imageCount":67,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:86833de447f25d1d0fc15ed5460c5068cc48b18b78b8108304c5b5fd1dff04ab","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:31180c161c4416e7c7d06d63571b814732d4ff11a14e2bfdcac0681ed14204ac","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:491bd3a9c1f09106983d7c3b85f1c97c80dd582f8d1a10e6f6794bf430d7ac19","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f2c59d19eb73ad5c0f93b0a63003c1885f5297959c9c45b401d1a74aea6e76","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cdd28dfe7132e19af9f013f72cf120d970bc31b6b74693af262f8d2e82a096e1","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"terminalCount":1,"shapes":[]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:de91abd5ad76fb491881a75a0feb4b8ca5600ceb5e15a4b0b687ada01ea0a44c","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":7,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f264240fe2a46d7aa95e56ee202a8403c3dad6c220cf29caff0936c82e0c086f","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:39c122c726d1bf520dd481350fee5ad940762d5d4c9f8c012db6bf56b0ca8757","firstArg":"P0uRYWPWnbxt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:0bccc03fd9ffe278e15c8f4be1db030307e4cd5020b78d711fc62f104fd6a980","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:0bccc03fd9ffe278e15c8f4be1db030307e4cd5020b78d711fc62f104fd6a980","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:96ae39329a45e017d3444b3794dc95126641ca54fe645bb8729b3d501bd47c64","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9174864cd47431966d033d283bc7836e7ca579139ef85c36275db542fda80803","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:97c7a635130c574a2c501091bb44f17cd92e05e29b5102e59578b5885d9bfec0","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011407015156522256033570 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-ff75f747c-r46tm2026-03-18T13:11:27.160596207Z E0318 13:11:27.159013 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.160596207Z E0318 13:11:27.159143 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.160596207Z E0318 13:11:27.159273 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.160596207Z E0318 13:11:27.159401 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.248209765Z E0318 13:11:27.248138 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.248246686Z E0318 13:11:27.248138 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.255534956Z E0318 13:11:27.253589 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.255534956Z E0318 13:11:27.253663 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.255534956Z E0318 13:11:27.253591 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.419642900Z E0318 13:11:27.419577 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.419905558Z E0318 13:11:27.419880 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.420057962Z E0318 13:11:27.420032 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.420209986Z E0318 13:11:27.420189 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.420356611Z E0318 13:11:27.420340 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.743372531Z E0318 13:11:27.743312 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.743472843Z E0318 13:11:27.743453 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.743622798Z E0318 13:11:27.743605 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.743686540Z E0318 13:11:27.743646 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.744999287Z E0318 13:11:27.743646 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:28.392501848Z E0318 13:11:28.391654 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:28.392501848Z E0318 13:11:28.392032 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:28.392501848Z E0318 13:11:28.392234 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:28.392501848Z E0318 13:11:28.392360 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:28.392501848Z E0318 13:11:28.392487 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:29.682777193Z E0318 13:11:29.682635 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:29.682777193Z E0318 13:11:29.682725 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:29.682810794Z E0318 13:11:29.682795 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:29.683152344Z E0318 13:11:29.682919 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:29.683152344Z E0318 13:11:29.683026 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:32.248923137Z E0318 13:11:32.248850 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:32.249812136Z E0318 13:11:32.249780 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:32.250687426Z E0318 13:11:32.249952 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:32.250687426Z E0318 13:11:32.250005 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:32.250687426Z E0318 13:11:32.250148 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:37.379257569Z E0318 13:11:37.379198 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:37.379257569Z E0318 13:11:37.379207 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:37.379345061Z E0318 13:11:37.379318 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:37.379546289Z E0318 13:11:37.379515 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:37.379616281Z E0318 13:11:37.379594 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604363670Z E0318 13:11:41.602896 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604363670Z E0318 13:11:41.603127 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604363670Z E0318 13:11:41.603250 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604363670Z E0318 13:11:41.603366 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604363670Z E0318 13:11:41.603513 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:47.627147372Z E0318 13:11:47.625369 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:47.627147372Z E0318 13:11:47.625641 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:47.627147372Z E0318 13:11:47.625763 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:47.627147372Z E0318 13:11:47.625879 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:47.627147372Z E0318 13:11:47.625993 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.168281914Z time="2026-03-18T13:11:49Z" level=info msg="connecting to source" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T13:11:49.197732992Z W0318 13:11:49.197673 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.165.196:50051: connect: connection refused" 2026-03-18T13:11:49.574490367Z time="2026-03-18T13:11:49Z" level=info msg="connecting to source" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T13:11:49.577487106Z W0318 13:11:49.576135 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.255.112:50051: connect: connection refused" 2026-03-18T13:11:50.203429228Z W0318 13:11:50.203351 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.165.196:50051: connect: connection refused" 2026-03-18T13:11:50.579557562Z W0318 13:11:50.579498 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.255.112:50051: connect: connection refused" 2026-03-18T13:11:50.768864040Z time="2026-03-18T13:11:50Z" level=info msg="connecting to source" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-18T13:11:50.772864141Z W0318 13:11:50.772807 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.251.130:50051: connect: connection refused" 2026-03-18T13:11:51.781039179Z W0318 13:11:51.780995 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.251.130:50051: connect: connection refused" 2026-03-18T13:11:51.799729304Z W0318 13:11:51.799668 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.165.196:50051: connect: connection refused" 2026-03-18T13:11:51.963832054Z time="2026-03-18T13:11:51Z" level=info msg="connecting to source" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T13:11:51.967552076Z W0318 13:11:51.967350 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.139.154:50051: connect: connection refused" 2026-03-18T13:11:52.341891561Z W0318 13:11:52.341840 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.255.112:50051: connect: connection refused" 2026-03-18T13:11:52.564368640Z time="2026-03-18T13:11:52Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T13:11:52.564531606Z time="2026-03-18T13:11:52Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.165.196:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-18T13:11:52.975677752Z W0318 13:11:52.974598 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.139.154:50051: connect: connection refused" 2026-03-18T13:11:53.150886956Z W0318 13:11:53.150833 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.251.130:50051: connect: connection refused" 2026-03-18T13:11:54.165727523Z time="2026-03-18T13:11:54Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T13:11:54.165771485Z time="2026-03-18T13:11:54Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.255.112:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-18T13:11:54.658250216Z W0318 13:11:54.658196 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.139.154:50051: connect: connection refused" 2026-03-18T13:11:54.764323386Z time="2026-03-18T13:11:54Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-18T13:11:54.764365367Z time="2026-03-18T13:11:54Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.251.130:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-18T13:11:54.779957130Z W0318 13:11:54.779909 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.165.196:50051: connect: connection refused" 2026-03-18T13:11:54.872585828Z W0318 13:11:54.872529 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.255.112:50051: connect: connection refused" 2026-03-18T13:11:55.327475153Z W0318 13:11:55.326144 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.251.130:50051: connect: connection refused" 2026-03-18T13:11:55.964574573Z time="2026-03-18T13:11:55Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T13:11:55.964624445Z time="2026-03-18T13:11:55Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.139.154:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-18T13:11:56.786537974Z time="2026-03-18T13:11:56Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T13:11:56.786579766Z time="2026-03-18T13:11:56Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.165.196:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-18T13:11:57.275371067Z W0318 13:11:57.275312 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.139.154:50051: connect: connection refused" 2026-03-18T13:11:57.965120088Z time="2026-03-18T13:11:57Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T13:11:57.965271963Z time="2026-03-18T13:11:57Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.255.112:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-18T13:11:58.766151131Z time="2026-03-18T13:11:58Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-18T13:11:58.766151131Z time="2026-03-18T13:11:58Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.251.130:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-18T13:11:59.024730388Z W0318 13:11:59.024665 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.251.130:50051: connect: connection refused" 2026-03-18T13:11:59.140522447Z W0318 13:11:59.140462 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.165.196:50051: connect: connection refused" 2026-03-18T13:11:59.455159989Z W0318 13:11:59.455112 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.255.112:50051: connect: connection refused" 2026-03-18T13:12:00.106557098Z time="2026-03-18T13:12:00Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T13:12:00.106557098Z time="2026-03-18T13:12:00Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.139.154:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-18T13:12:00.979845119Z W0318 13:12:00.979788 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.139.154:50051: connect: connection refused" 2026-03-18T13:12:04.866831406Z W0318 13:12:04.866775 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.251.130:50051: connect: connection refused" 2026-03-18T13:12:06.657757325Z W0318 13:12:06.657646 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.165.196:50051: connect: connection refused" 2026-03-18T13:12:06.693511672Z W0318 13:12:06.693376 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.255.112:50051: connect: connection refused" 2026-03-18T13:12:07.405692591Z W0318 13:12:07.405629 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.139.154:50051: connect: connection refused" 2026-03-18T13:12:11.611341742Z E0318 13:12:11.604523 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:12:11.611406534Z E0318 13:12:11.606719 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:12:11.611564259Z E0318 13:12:11.606795 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:12:11.611656752Z E0318 13:12:11.606883 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:12:11.611725164Z E0318 13:12:11.606935 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:12:11.756796857Z E0318 13:12:11.756716 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:12:11.760693485Z E0318 13:12:11.760659 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" packageserver_previous.log0000640000000000000000000000403615156522256033762 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-ff75f747c-r46tm2026-03-18T13:09:08.523962354Z time="2026-03-18T13:09:08Z" level=warning msg="Error initializing delegating authentication (will retry)" error="unable to load configmap based request-header-client-ca-file: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps extension-apiserver-authentication)" 2026-03-18T13:09:08.526111180Z panic: runtime error: invalid memory address or nil pointer dereference 2026-03-18T13:09:08.526111180Z [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x21af0b1] 2026-03-18T13:09:08.526111180Z 2026-03-18T13:09:08.526111180Z goroutine 1 [running]: 2026-03-18T13:09:08.526138161Z github.com/operator-framework/operator-lifecycle-manager/pkg/package-server/server.(*PackageServerOptions).Run(0xc00052d680, {0x2ce56c0, 0xc000534500}) 2026-03-18T13:09:08.526149311Z /build/vendor/github.com/operator-framework/operator-lifecycle-manager/pkg/package-server/server/server.go:210 +0xd1 2026-03-18T13:09:08.526159841Z github.com/operator-framework/operator-lifecycle-manager/pkg/package-server/server.NewCommandStartPackageServer.func1(0xc000576000?, {0x28d7721?, 0x4?, 0x28d75dd?}) 2026-03-18T13:09:08.526180302Z /build/vendor/github.com/operator-framework/operator-lifecycle-manager/pkg/package-server/server/server.go:50 +0x1f 2026-03-18T13:09:08.526206373Z github.com/spf13/cobra.(*Command).execute(0xc0000bc908, {0xc0001b8130, 0x5, 0x5}) 2026-03-18T13:09:08.526228213Z /build/vendor/github.com/spf13/cobra/command.go:985 +0xaca 2026-03-18T13:09:08.526238393Z github.com/spf13/cobra.(*Command).ExecuteC(0xc0000bc908) 2026-03-18T13:09:08.526238393Z /build/vendor/github.com/spf13/cobra/command.go:1117 +0x3ff 2026-03-18T13:09:08.526248624Z github.com/spf13/cobra.(*Command).Execute(0xc000576000?) 2026-03-18T13:09:08.526258824Z /build/vendor/github.com/spf13/cobra/command.go:1041 +0x13 2026-03-18T13:09:08.526269234Z main.main() 2026-03-18T13:09:08.526269234Z /build/vendor/github.com/operator-framework/operator-lifecycle-manager/cmd/package-server/main.go:31 +0x185 config/pod/openshift-operator-lifecycle-manager/packageserver-ff75f747c-r46tm.json0000640000000000000000000002032215156522256026503 0ustar0000000000000000{"metadata":{"name":"packageserver-ff75f747c-r46tm","generateName":"packageserver-ff75f747c-","namespace":"openshift-operator-lifecycle-manager","uid":"3ee0f85b-219b-47cb-a22a-67d359a69881","resourceVersion":"9425","creationTimestamp":"2026-03-18T13:07:58Z","labels":{"app":"packageserver","pod-template-hash":"ff75f747c"},"annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.58/23\"],\"mac_address\":\"0a:58:0a:80:00:3a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.58/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.58\"\n ],\n \"mac\": \"0a:58:0a:80:00:3a\",\n \"default\": true,\n \"dns\": {}\n}]","olm.operatorGroup":"olm-operators","olm.operatorNamespace":"openshift-operator-lifecycle-manager","olm.targetNamespaces":"openshift-operator-lifecycle-manager","olmcahash":"155acfa8dab78634e401a751b5c581c4abea41d4b953ff5e5f07601a8fff4729","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"packageserver-ff75f747c","uid":"5989394b-e6bd-43a4-ad7e-580d231d9b72","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"tmpfs","emptyDir":{}},{"name":"apiservice-cert","secret":{"secretName":"packageserver-service-cert","items":[{"key":"tls.crt","path":"apiserver.crt"},{"key":"tls.key","path":"apiserver.key"}],"defaultMode":420}},{"name":"webhook-cert","secret":{"secretName":"packageserver-service-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420}},{"name":"kube-api-access-82f9g","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"packageserver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","command":["/bin/package-server","-v=4","--secure-port","5443","--global-namespace","openshift-marketplace"],"ports":[{"containerPort":5443,"protocol":"TCP"}],"env":[{"name":"OPERATOR_CONDITION_NAME","value":"packageserver"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"tmpfs","mountPath":"/tmp"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"webhook-cert","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-82f9g","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":5443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":5443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:58Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:58Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.58","podIPs":[{"ip":"10.128.0.58"}],"startTime":"2026-03-18T13:07:58Z","containerStatuses":[{"name":"packageserver","state":{"running":{"startedAt":"2026-03-18T13:11:06Z"}},"lastState":{"terminated":{"exitCode":2,"reason":"Error","message":"time=\"2026-03-18T13:09:08Z\" level=warning msg=\"Error initializing delegating authentication (will retry)\" error=\"unable to load configmap based request-header-client-ca-file: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps extension-apiserver-authentication)\"\npanic: runtime error: invalid memory address or nil pointer dereference\n[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x21af0b1]\n\ngoroutine 1 [running]:\ngithub.com/operator-framework/operator-lifecycle-manager/pkg/package-server/server.(*PackageServerOptions).Run(0xc00052d680, {0x2ce56c0, 0xc000534500})\n\t/build/vendor/github.com/operator-framework/operator-lifecycle-manager/pkg/package-server/server/server.go:210 +0xd1\ngithub.com/operator-framework/operator-lifecycle-manager/pkg/package-server/server.NewCommandStartPackageServer.func1(0xc000576000?, {0x28d7721?, 0x4?, 0x28d75dd?})\n\t/build/vendor/github.com/operator-framework/operator-lifecycle-manager/pkg/package-server/server/server.go:50 +0x1f\ngithub.com/spf13/cobra.(*Command).execute(0xc0000bc908, {0xc0001b8130, 0x5, 0x5})\n\t/build/vendor/github.com/spf13/cobra/command.go:985 +0xaca\ngithub.com/spf13/cobra.(*Command).ExecuteC(0xc0000bc908)\n\t/build/vendor/github.com/spf13/cobra/command.go:1117 +0x3ff\ngithub.com/spf13/cobra.(*Command).Execute(0xc000576000?)\n\t/build/vendor/github.com/spf13/cobra/command.go:1041 +0x13\nmain.main()\n\t/build/vendor/github.com/operator-framework/operator-lifecycle-manager/cmd/package-server/main.go:31 +0x185\n","startedAt":"2026-03-18T13:08:08Z","finishedAt":"2026-03-18T13:09:08Z","containerID":"cri-o://48e43ee75779b8e1045feaede050da1592482395d03ca73890f0546a58a0cc80"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","containerID":"cri-o://a173260494fc7cb4b3e5f060c679f7a75fbec9929d0f639c7f0f786a29fccfb7","started":true,"volumeMounts":[{"name":"tmpfs","mountPath":"/tmp"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"webhook-cert","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-82f9g","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}package-server-manager_current.log0000640000000000000000000002546415156522256037030 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-p7vvx2026-03-18T13:07:54.733971214Z 2026-03-18T13:07:54Z INFO setup starting manager 2026-03-18T13:07:54.743946582Z 2026-03-18T13:07:54Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-18T13:07:54.743946582Z 2026-03-18T13:07:54Z INFO controller-runtime.metrics Starting metrics server 2026-03-18T13:07:54.743946582Z 2026-03-18T13:07:54Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-18T13:07:54.743946582Z I0318 13:07:54.742365 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-18T13:07:54.743946582Z 2026-03-18T13:07:54Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-18T13:07:54.780122257Z I0318 13:07:54.778246 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-18T13:07:54.780122257Z 2026-03-18T13:07:54Z DEBUG events package-server-manager-7b95f86987-p7vvx_7d888e42-b50f-40eb-9376-8d84f2433cec became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"65a69b94-0c48-42f0-84f6-64d4dcb7093c","apiVersion":"coordination.k8s.io/v1","resourceVersion":"7872"}, "reason": "LeaderElection"} 2026-03-18T13:07:54.780122257Z 2026-03-18T13:07:54Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-18T13:07:54.780122257Z 2026-03-18T13:07:54Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-18T13:07:54.780122257Z 2026-03-18T13:07:54Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-18T13:07:54.904456214Z 2026-03-18T13:07:54Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-18T13:07:54.904456214Z 2026-03-18T13:07:54Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-18T13:07:54.904456214Z 2026-03-18T13:07:54Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:07:54.904456214Z 2026-03-18T13:07:54Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:55.219488799Z 2026-03-18T13:07:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:55.219488799Z 2026-03-18T13:07:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:07:55.293588911Z 2026-03-18T13:07:55Z INFO controllers.packageserver attempting to create the packageserver csv 2026-03-18T13:07:55.307138849Z 2026-03-18T13:07:55Z INFO controllers.packageserver updating csv spec 2026-03-18T13:07:55.325028797Z 2026-03-18T13:07:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-03-18T13:07:55.325072418Z 2026-03-18T13:07:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:55.325166321Z 2026-03-18T13:07:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:07:55.325188461Z 2026-03-18T13:07:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:55.334501014Z 2026-03-18T13:07:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:55.334501014Z 2026-03-18T13:07:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:07:55.410151894Z 2026-03-18T13:07:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:07:55.410151894Z 2026-03-18T13:07:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:55.410289708Z 2026-03-18T13:07:55Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:07:55.410289708Z 2026-03-18T13:07:55Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:55.410437071Z 2026-03-18T13:07:55Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:55.410474212Z 2026-03-18T13:07:55Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:07:55.443522669Z 2026-03-18T13:07:55Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:07:55.443522669Z 2026-03-18T13:07:55Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:56.665603425Z 2026-03-18T13:07:56Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:07:56.665664796Z 2026-03-18T13:07:56Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:56.665737318Z 2026-03-18T13:07:56Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:56.665781769Z 2026-03-18T13:07:56Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:07:56.686471597Z 2026-03-18T13:07:56Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:07:56.686471597Z 2026-03-18T13:07:56Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:58.502463348Z 2026-03-18T13:07:58Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:07:58.502463348Z 2026-03-18T13:07:58Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:58.502463348Z 2026-03-18T13:07:58Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:58.502463348Z 2026-03-18T13:07:58Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:07:58.618478367Z 2026-03-18T13:07:58Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:07:58.618478367Z 2026-03-18T13:07:58Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:58.774553478Z 2026-03-18T13:07:58Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:07:58.774553478Z 2026-03-18T13:07:58Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:58.778125537Z 2026-03-18T13:07:58Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:07:58.778125537Z 2026-03-18T13:07:58Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:07:58.814480736Z 2026-03-18T13:07:58Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:07:58.814480736Z 2026-03-18T13:07:58Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:28.805098121Z E0318 13:09:28.805002 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-18T13:10:28.808273849Z E0318 13:10:28.808199 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) kube-rbac-proxy_current.log0000640000000000000000000000160415156522256035521 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-p7vvx2026-03-18T13:07:39.578052998Z W0318 13:07:39.577882 1 deprecated.go:66] 2026-03-18T13:07:39.578052998Z ==== Removed Flag Warning ====================== 2026-03-18T13:07:39.578052998Z 2026-03-18T13:07:39.578052998Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-18T13:07:39.578052998Z 2026-03-18T13:07:39.578052998Z =============================================== 2026-03-18T13:07:39.578052998Z 2026-03-18T13:07:39.578356116Z I0318 13:07:39.578324 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-18T13:07:39.579586116Z I0318 13:07:39.579560 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-18T13:07:39.579860033Z I0318 13:07:39.579824 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-18T13:07:39.580383606Z I0318 13:07:39.580346 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415156522256033071 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-5c9796789-z8jkt2026-03-18T13:12:02.004670655Z time="2026-03-18T13:12:02Z" level=info msg="install strategy successful" csv=packageserver id=Inw7t namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:02.288079318Z time="2026-03-18T13:12:02Z" level=info msg="install strategy successful" csv=packageserver id=XSvpX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:02.295068719Z time="2026-03-18T13:12:02Z" level=info msg="install strategy successful" csv=packageserver id=/kHxd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:02.605335975Z time="2026-03-18T13:12:02Z" level=info msg="install strategy successful" csv=packageserver id=kckJG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:02.610633400Z time="2026-03-18T13:12:02Z" level=info msg="install strategy successful" csv=packageserver id=VlDCk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:02.617673782Z time="2026-03-18T13:12:02Z" level=info msg="install strategy successful" csv=packageserver id=xlB4F namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:02.624021010Z time="2026-03-18T13:12:02Z" level=info msg="install strategy successful" csv=packageserver id=wOkui namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:02.660749809Z time="2026-03-18T13:12:02Z" level=info msg="install strategy successful" csv=packageserver id=AX3bh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:02.760635195Z time="2026-03-18T13:12:02Z" level=info msg="install strategy successful" csv=packageserver id=FKHSO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:02.860860872Z time="2026-03-18T13:12:02Z" level=info msg="install strategy successful" csv=packageserver id=l7S1f namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:02.961150931Z time="2026-03-18T13:12:02Z" level=info msg="install strategy successful" csv=packageserver id=gUOQ0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:03.064075147Z time="2026-03-18T13:12:03Z" level=info msg="install strategy successful" csv=packageserver id=geVRq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:03.160760019Z time="2026-03-18T13:12:03Z" level=info msg="install strategy successful" csv=packageserver id=PcEiP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:03.261822184Z time="2026-03-18T13:12:03Z" level=info msg="install strategy successful" csv=packageserver id=Vn/Xc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:03.361672038Z time="2026-03-18T13:12:03Z" level=info msg="install strategy successful" csv=packageserver id=q9Zgv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:03.461573305Z time="2026-03-18T13:12:03Z" level=info msg="install strategy successful" csv=packageserver id=hclSg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:03.561052127Z time="2026-03-18T13:12:03Z" level=info msg="install strategy successful" csv=packageserver id=cdLh7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:03.661262904Z time="2026-03-18T13:12:03Z" level=info msg="install strategy successful" csv=packageserver id=2zjuz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:03.761265154Z time="2026-03-18T13:12:03Z" level=info msg="install strategy successful" csv=packageserver id=qek8j namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:03.876722013Z time="2026-03-18T13:12:03Z" level=info msg="install strategy successful" csv=packageserver id=D2AG6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:03.961108709Z time="2026-03-18T13:12:03Z" level=info msg="install strategy successful" csv=packageserver id=SjqGj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:04.061750550Z time="2026-03-18T13:12:04Z" level=info msg="install strategy successful" csv=packageserver id=5QRq1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:04.161008776Z time="2026-03-18T13:12:04Z" level=info msg="install strategy successful" csv=packageserver id=K5RJm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:04.261539772Z time="2026-03-18T13:12:04Z" level=info msg="install strategy successful" csv=packageserver id=p63Bi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:04.366928140Z time="2026-03-18T13:12:04Z" level=info msg="install strategy successful" csv=packageserver id=gnx6/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:04.638382700Z time="2026-03-18T13:12:04Z" level=info msg="install strategy successful" csv=packageserver id=Nkll5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:04.644174141Z time="2026-03-18T13:12:04Z" level=info msg="install strategy successful" csv=packageserver id=7XAo0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:04.660855250Z time="2026-03-18T13:12:04Z" level=info msg="install strategy successful" csv=packageserver id=Uy9UX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:04.760458957Z time="2026-03-18T13:12:04Z" level=info msg="install strategy successful" csv=packageserver id=xZBzd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:04.861747229Z time="2026-03-18T13:12:04Z" level=info msg="install strategy successful" csv=packageserver id=hws2j namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:04.961050356Z time="2026-03-18T13:12:04Z" level=info msg="install strategy successful" csv=packageserver id=Ru/cm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:05.061763429Z time="2026-03-18T13:12:05Z" level=info msg="install strategy successful" csv=packageserver id=Jp4XU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:05.161443839Z time="2026-03-18T13:12:05Z" level=info msg="install strategy successful" csv=packageserver id=+wQoM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:05.260989773Z time="2026-03-18T13:12:05Z" level=info msg="install strategy successful" csv=packageserver id=a5J6m namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:05.473218765Z time="2026-03-18T13:12:05Z" level=info msg="install strategy successful" csv=packageserver id=wOfyQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:05.479429849Z time="2026-03-18T13:12:05Z" level=info msg="install strategy successful" csv=packageserver id=eJgt5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:05.560248508Z time="2026-03-18T13:12:05Z" level=info msg="install strategy successful" csv=packageserver id=ss3wt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:05.661501259Z time="2026-03-18T13:12:05Z" level=info msg="install strategy successful" csv=packageserver id=lp+Cx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:05.761031624Z time="2026-03-18T13:12:05Z" level=info msg="install strategy successful" csv=packageserver id=UUfEJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:05.861717677Z time="2026-03-18T13:12:05Z" level=info msg="install strategy successful" csv=packageserver id=FWpBn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:05.961009203Z time="2026-03-18T13:12:05Z" level=info msg="install strategy successful" csv=packageserver id=tpOU+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:06.136841468Z time="2026-03-18T13:12:06Z" level=info msg="install strategy successful" csv=packageserver id=OsFRf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:06.163026649Z time="2026-03-18T13:12:06Z" level=info msg="install strategy successful" csv=packageserver id=d1Syg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:06.492055584Z time="2026-03-18T13:12:06Z" level=info msg="install strategy successful" csv=packageserver id=zZadd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:06.505266868Z time="2026-03-18T13:12:06Z" level=info msg="install strategy successful" csv=packageserver id=I26UZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:06.519852099Z time="2026-03-18T13:12:06Z" level=info msg="install strategy successful" csv=packageserver id=ZAZjb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:06.561057524Z time="2026-03-18T13:12:06Z" level=info msg="install strategy successful" csv=packageserver id=h3B1T namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:06.661806538Z time="2026-03-18T13:12:06Z" level=info msg="install strategy successful" csv=packageserver id=HhCD2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:06.762512031Z time="2026-03-18T13:12:06Z" level=info msg="install strategy successful" csv=packageserver id=2U2NP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:06.860985711Z time="2026-03-18T13:12:06Z" level=info msg="install strategy successful" csv=packageserver id=Qx52D namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:06.961311702Z time="2026-03-18T13:12:06Z" level=info msg="install strategy successful" csv=packageserver id=8tnqo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:07.061650773Z time="2026-03-18T13:12:07Z" level=info msg="install strategy successful" csv=packageserver id=bdabG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:07.162896053Z time="2026-03-18T13:12:07Z" level=info msg="install strategy successful" csv=packageserver id=ctzHI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:07.262439449Z time="2026-03-18T13:12:07Z" level=info msg="install strategy successful" csv=packageserver id=60Tqh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:07.361304021Z time="2026-03-18T13:12:07Z" level=info msg="install strategy successful" csv=packageserver id=dnqRF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:07.503336914Z time="2026-03-18T13:12:07Z" level=info msg="install strategy successful" csv=packageserver id=q1du4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:07.561618471Z time="2026-03-18T13:12:07Z" level=info msg="install strategy successful" csv=packageserver id=ZNNGy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:07.661142195Z time="2026-03-18T13:12:07Z" level=info msg="install strategy successful" csv=packageserver id=Mf7SQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:07.787468721Z time="2026-03-18T13:12:07Z" level=info msg="install strategy successful" csv=packageserver id=pGdxZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:07.861070442Z time="2026-03-18T13:12:07Z" level=info msg="install strategy successful" csv=packageserver id=oXve7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:07.961317841Z time="2026-03-18T13:12:07Z" level=info msg="install strategy successful" csv=packageserver id=YBqtd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:08.061753985Z time="2026-03-18T13:12:08Z" level=info msg="install strategy successful" csv=packageserver id=lQ51V namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:08.165355703Z time="2026-03-18T13:12:08Z" level=info msg="install strategy successful" csv=packageserver id=PHMBV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:08.261877258Z time="2026-03-18T13:12:08Z" level=info msg="install strategy successful" csv=packageserver id=HjGzD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:08.360908647Z time="2026-03-18T13:12:08Z" level=info msg="install strategy successful" csv=packageserver id=/H8Uo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:08.460532364Z time="2026-03-18T13:12:08Z" level=info msg="install strategy successful" csv=packageserver id=aNQbK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:08.561099473Z time="2026-03-18T13:12:08Z" level=info msg="install strategy successful" csv=packageserver id=oO+Ed namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:08.663118999Z time="2026-03-18T13:12:08Z" level=info msg="install strategy successful" csv=packageserver id=drpjU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:08.760708780Z time="2026-03-18T13:12:08Z" level=info msg="install strategy successful" csv=packageserver id=WG5gt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:08.862207689Z time="2026-03-18T13:12:08Z" level=info msg="install strategy successful" csv=packageserver id=UrWNx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:08.960610596Z time="2026-03-18T13:12:08Z" level=info msg="install strategy successful" csv=packageserver id=Z+VYB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:09.061921429Z time="2026-03-18T13:12:09Z" level=info msg="install strategy successful" csv=packageserver id=Rhy1e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:09.160286055Z time="2026-03-18T13:12:09Z" level=info msg="install strategy successful" csv=packageserver id=1twdI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:09.260544784Z time="2026-03-18T13:12:09Z" level=info msg="install strategy successful" csv=packageserver id=ak5Z8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:09.360984508Z time="2026-03-18T13:12:09Z" level=info msg="install strategy successful" csv=packageserver id=fbD7o namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:09.461362701Z time="2026-03-18T13:12:09Z" level=info msg="install strategy successful" csv=packageserver id=HWG6e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:09.561988791Z time="2026-03-18T13:12:09Z" level=info msg="install strategy successful" csv=packageserver id=wqN9v namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:09.660459731Z time="2026-03-18T13:12:09Z" level=info msg="install strategy successful" csv=packageserver id=EVGTG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:09.760582994Z time="2026-03-18T13:12:09Z" level=info msg="install strategy successful" csv=packageserver id=yjqNv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:09.861712142Z time="2026-03-18T13:12:09Z" level=info msg="install strategy successful" csv=packageserver id=K5Ndd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:09.961516105Z time="2026-03-18T13:12:09Z" level=info msg="install strategy successful" csv=packageserver id=awMR4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:10.060833033Z time="2026-03-18T13:12:10Z" level=info msg="install strategy successful" csv=packageserver id=71d18 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:10.161701971Z time="2026-03-18T13:12:10Z" level=info msg="install strategy successful" csv=packageserver id=s8t16 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:10.261616267Z time="2026-03-18T13:12:10Z" level=info msg="install strategy successful" csv=packageserver id=AYpXI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:10.360094297Z time="2026-03-18T13:12:10Z" level=info msg="install strategy successful" csv=packageserver id=ZAzd4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:10.460774509Z time="2026-03-18T13:12:10Z" level=info msg="install strategy successful" csv=packageserver id=RkfH+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:10.561443551Z time="2026-03-18T13:12:10Z" level=info msg="install strategy successful" csv=packageserver id=vwN2c namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:10.661502223Z time="2026-03-18T13:12:10Z" level=info msg="install strategy successful" csv=packageserver id=mVOKE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:10.762189316Z time="2026-03-18T13:12:10Z" level=info msg="install strategy successful" csv=packageserver id=Yolox namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:10.862253868Z time="2026-03-18T13:12:10Z" level=info msg="install strategy successful" csv=packageserver id=Ezkl+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:10.965007168Z time="2026-03-18T13:12:10Z" level=info msg="install strategy successful" csv=packageserver id=X7VW7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:11.064896485Z time="2026-03-18T13:12:11Z" level=info msg="install strategy successful" csv=packageserver id=7uRpT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:11.160924793Z time="2026-03-18T13:12:11Z" level=info msg="install strategy successful" csv=packageserver id=xryxd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:11.267518280Z time="2026-03-18T13:12:11Z" level=info msg="install strategy successful" csv=packageserver id=y+bF0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:11.364262113Z time="2026-03-18T13:12:11Z" level=info msg="install strategy successful" csv=packageserver id=JK0eO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:12.399109688Z time="2026-03-18T13:12:12Z" level=info msg="install strategy successful" csv=packageserver id=4xYgJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:12.496300616Z time="2026-03-18T13:12:12Z" level=info msg="install strategy successful" csv=packageserver id=6Qh7E namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:12.599662947Z time="2026-03-18T13:12:12Z" level=info msg="install strategy successful" csv=packageserver id=5iBzI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:12.697936000Z time="2026-03-18T13:12:12Z" level=info msg="install strategy successful" csv=packageserver id=/g+e2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:12:12.709359355Z time="2026-03-18T13:12:12Z" level=info msg="install strategy successful" csv=packageserver id=igoio namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000005320715156522256034636 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-68f85b4d6c-t84s92026-03-18T13:12:00.160146581Z time="2026-03-18T13:12:00Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-tqw5h current-pod.namespace=openshift-marketplace id=+e0UB 2026-03-18T13:12:00.160146581Z time="2026-03-18T13:12:00Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-tqw5h current-pod.namespace=openshift-marketplace id=+e0UB 2026-03-18T13:12:00.160260505Z time="2026-03-18T13:12:00Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=+e0UB 2026-03-18T13:12:00.160334548Z time="2026-03-18T13:12:00Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+e0UB 2026-03-18T13:12:00.160356438Z time="2026-03-18T13:12:00Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+e0UB 2026-03-18T13:12:00.160690740Z time="2026-03-18T13:12:00Z" level=info msg="No subscriptions were found in namespace openshift-openstack-infra" id=Pt1BW namespace=openshift-openstack-infra 2026-03-18T13:12:00.160775703Z time="2026-03-18T13:12:00Z" level=info msg="resolving sources" id=uDknU namespace=openshift-operator-lifecycle-manager 2026-03-18T13:12:00.160775703Z time="2026-03-18T13:12:00Z" level=info msg="checking if subscriptions need update" id=uDknU namespace=openshift-operator-lifecycle-manager 2026-03-18T13:12:00.358468476Z time="2026-03-18T13:12:00Z" level=info msg="No subscriptions were found in namespace openshift-operator-controller" id=+AnJf namespace=openshift-operator-controller 2026-03-18T13:12:00.358580430Z time="2026-03-18T13:12:00Z" level=info msg="resolving sources" id=Un1Tu namespace=openshift-operators 2026-03-18T13:12:00.358580430Z time="2026-03-18T13:12:00Z" level=info msg="checking if subscriptions need update" id=Un1Tu namespace=openshift-operators 2026-03-18T13:12:00.559290933Z time="2026-03-18T13:12:00Z" level=info msg="No subscriptions were found in namespace openshift-operator-lifecycle-manager" id=uDknU namespace=openshift-operator-lifecycle-manager 2026-03-18T13:12:00.559290933Z time="2026-03-18T13:12:00Z" level=info msg="resolving sources" id=fOxDe namespace=openshift-ovirt-infra 2026-03-18T13:12:00.559290933Z time="2026-03-18T13:12:00Z" level=info msg="checking if subscriptions need update" id=fOxDe namespace=openshift-ovirt-infra 2026-03-18T13:12:00.758145535Z time="2026-03-18T13:12:00Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=SNy4A 2026-03-18T13:12:00.758257009Z time="2026-03-18T13:12:00Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-8wqfk current-pod.namespace=openshift-marketplace id=SNy4A 2026-03-18T13:12:00.758257009Z time="2026-03-18T13:12:00Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-8wqfk current-pod.namespace=openshift-marketplace id=SNy4A 2026-03-18T13:12:00.758291430Z time="2026-03-18T13:12:00Z" level=info msg="No subscriptions were found in namespace openshift-operators" id=Un1Tu namespace=openshift-operators 2026-03-18T13:12:00.758325401Z time="2026-03-18T13:12:00Z" level=info msg="resolving sources" id=FLt0P namespace=openshift-ovn-kubernetes 2026-03-18T13:12:00.758325401Z time="2026-03-18T13:12:00Z" level=info msg="checking if subscriptions need update" id=FLt0P namespace=openshift-ovn-kubernetes 2026-03-18T13:12:00.758356202Z time="2026-03-18T13:12:00Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=SNy4A 2026-03-18T13:12:00.758356202Z time="2026-03-18T13:12:00Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=SNy4A 2026-03-18T13:12:00.758431335Z time="2026-03-18T13:12:00Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:00.758459696Z time="2026-03-18T13:12:00Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:00.958259118Z time="2026-03-18T13:12:00Z" level=info msg="No subscriptions were found in namespace openshift-ovirt-infra" id=fOxDe namespace=openshift-ovirt-infra 2026-03-18T13:12:00.958259118Z time="2026-03-18T13:12:00Z" level=info msg="resolving sources" id=s4/Fm namespace=openshift-route-controller-manager 2026-03-18T13:12:00.958259118Z time="2026-03-18T13:12:00Z" level=info msg="checking if subscriptions need update" id=s4/Fm namespace=openshift-route-controller-manager 2026-03-18T13:12:01.157996510Z time="2026-03-18T13:12:01Z" level=info msg="No subscriptions were found in namespace openshift-ovn-kubernetes" id=FLt0P namespace=openshift-ovn-kubernetes 2026-03-18T13:12:01.158045422Z time="2026-03-18T13:12:01Z" level=info msg="resolving sources" id=/Pxq3 namespace=openshift-service-ca 2026-03-18T13:12:01.158045422Z time="2026-03-18T13:12:01Z" level=info msg="checking if subscriptions need update" id=/Pxq3 namespace=openshift-service-ca 2026-03-18T13:12:01.359428147Z time="2026-03-18T13:12:01Z" level=info msg="No subscriptions were found in namespace openshift-route-controller-manager" id=s4/Fm namespace=openshift-route-controller-manager 2026-03-18T13:12:01.359459078Z time="2026-03-18T13:12:01Z" level=info msg="resolving sources" id=7g6sf namespace=openshift-service-ca-operator 2026-03-18T13:12:01.359459078Z time="2026-03-18T13:12:01Z" level=info msg="checking if subscriptions need update" id=7g6sf namespace=openshift-service-ca-operator 2026-03-18T13:12:01.359648934Z time="2026-03-18T13:12:01Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+e0UB 2026-03-18T13:12:01.359899883Z time="2026-03-18T13:12:01Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-tqw5h current-pod.namespace=openshift-marketplace id=+e0UB 2026-03-18T13:12:01.359942074Z time="2026-03-18T13:12:01Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-tqw5h current-pod.namespace=openshift-marketplace id=+e0UB 2026-03-18T13:12:01.360087519Z time="2026-03-18T13:12:01Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+e0UB 2026-03-18T13:12:01.360122470Z time="2026-03-18T13:12:01Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+e0UB 2026-03-18T13:12:01.360246814Z time="2026-03-18T13:12:01Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:01.360299726Z time="2026-03-18T13:12:01Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:01.559313853Z time="2026-03-18T13:12:01Z" level=info msg="No subscriptions were found in namespace openshift-service-ca" id=/Pxq3 namespace=openshift-service-ca 2026-03-18T13:12:01.559313853Z time="2026-03-18T13:12:01Z" level=info msg="resolving sources" id=V+sWu namespace=openshift-user-workload-monitoring 2026-03-18T13:12:01.559313853Z time="2026-03-18T13:12:01Z" level=info msg="checking if subscriptions need update" id=V+sWu namespace=openshift-user-workload-monitoring 2026-03-18T13:12:01.560387698Z time="2026-03-18T13:12:01Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:01.560406048Z time="2026-03-18T13:12:01Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-bxlrz current-pod.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:01.560450990Z time="2026-03-18T13:12:01Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-bxlrz current-pod.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:01.560450990Z time="2026-03-18T13:12:01Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=jpo3d 2026-03-18T13:12:01.560450990Z time="2026-03-18T13:12:01Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:01.560462410Z time="2026-03-18T13:12:01Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:01.759723695Z time="2026-03-18T13:12:01Z" level=info msg="No subscriptions were found in namespace openshift-service-ca-operator" id=7g6sf namespace=openshift-service-ca-operator 2026-03-18T13:12:01.759723695Z time="2026-03-18T13:12:01Z" level=info msg="resolving sources" id=NMqJQ namespace=openshift-vsphere-infra 2026-03-18T13:12:01.759770307Z time="2026-03-18T13:12:01Z" level=info msg="checking if subscriptions need update" id=NMqJQ namespace=openshift-vsphere-infra 2026-03-18T13:12:01.961035969Z time="2026-03-18T13:12:01Z" level=info msg="No subscriptions were found in namespace openshift-user-workload-monitoring" id=V+sWu namespace=openshift-user-workload-monitoring 2026-03-18T13:12:02.283659042Z time="2026-03-18T13:12:02Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:02.283659042Z time="2026-03-18T13:12:02Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-89st2 current-pod.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:02.283659042Z time="2026-03-18T13:12:02Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-89st2 current-pod.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:02.283659042Z time="2026-03-18T13:12:02Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=p+qDV 2026-03-18T13:12:02.283659042Z time="2026-03-18T13:12:02Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:02.283659042Z time="2026-03-18T13:12:02Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:02.283659042Z time="2026-03-18T13:12:02Z" level=info msg="No subscriptions were found in namespace openshift-vsphere-infra" id=NMqJQ namespace=openshift-vsphere-infra 2026-03-18T13:12:02.758203395Z time="2026-03-18T13:12:02Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:02.758358230Z time="2026-03-18T13:12:02Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-bxlrz current-pod.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:02.758395611Z time="2026-03-18T13:12:02Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-bxlrz current-pod.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:02.758518695Z time="2026-03-18T13:12:02Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:02.758549536Z time="2026-03-18T13:12:02Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=jpo3d 2026-03-18T13:12:03.158367250Z time="2026-03-18T13:12:03Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:03.158480694Z time="2026-03-18T13:12:03Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-89st2 current-pod.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:03.158480694Z time="2026-03-18T13:12:03Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-89st2 current-pod.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:03.158599897Z time="2026-03-18T13:12:03Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:03.158599897Z time="2026-03-18T13:12:03Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=p+qDV 2026-03-18T13:12:11.850755159Z time="2026-03-18T13:12:11Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:11.850755159Z time="2026-03-18T13:12:11Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:12.399244163Z time="2026-03-18T13:12:12Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:12.399244163Z time="2026-03-18T13:12:12Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-89st2 current-pod.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:12.399244163Z time="2026-03-18T13:12:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-89st2 current-pod.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:12.399244163Z time="2026-03-18T13:12:12Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=QH1Av 2026-03-18T13:12:12.399244163Z time="2026-03-18T13:12:12Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:12.399244163Z time="2026-03-18T13:12:12Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:12.399244163Z time="2026-03-18T13:12:12Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.399244163Z time="2026-03-18T13:12:12Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.409774849Z time="2026-03-18T13:12:12Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.409908304Z time="2026-03-18T13:12:12Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-tqw5h current-pod.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.409934654Z time="2026-03-18T13:12:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-tqw5h current-pod.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.409934654Z time="2026-03-18T13:12:12Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=yY4YD 2026-03-18T13:12:12.409945865Z time="2026-03-18T13:12:12Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.409955905Z time="2026-03-18T13:12:12Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.419297172Z time="2026-03-18T13:12:12Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:12.419475759Z time="2026-03-18T13:12:12Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-89st2 current-pod.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:12.419583932Z time="2026-03-18T13:12:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-89st2 current-pod.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:12.419700056Z time="2026-03-18T13:12:12Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:12.419711067Z time="2026-03-18T13:12:12Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=QH1Av 2026-03-18T13:12:12.427765642Z time="2026-03-18T13:12:12Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=yRTwO 2026-03-18T13:12:12.427765642Z time="2026-03-18T13:12:12Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=yRTwO 2026-03-18T13:12:12.432909460Z time="2026-03-18T13:12:12Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.432945871Z time="2026-03-18T13:12:12Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-tqw5h current-pod.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.432945871Z time="2026-03-18T13:12:12Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-tqw5h current-pod.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.433126837Z time="2026-03-18T13:12:12Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.433126837Z time="2026-03-18T13:12:12Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=yY4YD 2026-03-18T13:12:12.445559787Z time="2026-03-18T13:12:12Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=DR0/S 2026-03-18T13:12:12.445559787Z time="2026-03-18T13:12:12Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=DR0/S catalog-operator_previous.log0000640000000000000000000000253015156522256035021 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-68f85b4d6c-t84s92026-03-18T13:10:21.673892031Z time="2026-03-18T13:10:21Z" level=info msg="log level info" 2026-03-18T13:10:21.674119777Z time="2026-03-18T13:10:21Z" level=info msg="TLS keys set, using https for metrics" 2026-03-18T13:10:21.674440215Z time="2026-03-18T13:10:21Z" level=info msg="No client CA provided, client certificate verification disabled" 2026-03-18T13:10:21.674496907Z W0318 13:10:21.674472 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work. 2026-03-18T13:10:21.674783665Z time="2026-03-18T13:10:21Z" level=info msg="Using in-cluster kube client config" 2026-03-18T13:10:21.675661178Z time="2026-03-18T13:10:21Z" level=info msg="Using in-cluster kube client config" 2026-03-18T13:10:21.675841903Z W0318 13:10:21.675806 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work. 2026-03-18T13:11:21.684012153Z Error: error configuring catalog operator: the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com) 2026-03-18T13:11:21.684012153Z error configuring catalog operator: the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com) config/pod/openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-t84s9.json0000640000000000000000000001656115156522256027136 0ustar0000000000000000{"metadata":{"name":"catalog-operator-68f85b4d6c-t84s9","generateName":"catalog-operator-68f85b4d6c-","namespace":"openshift-operator-lifecycle-manager","uid":"d2455453-5943-49ef-bfea-cba077197da0","resourceVersion":"10542","creationTimestamp":"2026-03-18T13:05:34Z","labels":{"app":"catalog-operator","pod-template-hash":"68f85b4d6c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.21/23\"],\"mac_address\":\"0a:58:0a:80:00:15\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.21/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.21\"\n ],\n \"mac\": \"0a:58:0a:80:00:15\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalog-operator-68f85b4d6c","uid":"972b9988-267a-430c-a168-e84a00f50d1d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"srv-cert","secret":{"secretName":"catalog-operator-serving-cert","defaultMode":420}},{"name":"kube-api-access-lxk9v","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"catalog-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","command":["/bin/catalog"],"args":["--namespace","openshift-marketplace","--configmapServerImage=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","--opmImage=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","--util-image","quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","--writeStatusName","operator-lifecycle-manager-catalog","--tls-cert","/srv-cert/tls.crt","--tls-key","/srv-cert/tls.key","--set-workload-user-id=false"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"}],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"srv-cert","readOnly":true,"mountPath":"/srv-cert"},{"name":"kube-api-access-lxk9v","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:55Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:47Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:47Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.21","podIPs":[{"ip":"10.128.0.21"}],"startTime":"2026-03-18T13:06:52Z","containerStatuses":[{"name":"catalog-operator","state":{"running":{"startedAt":"2026-03-18T13:11:47Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"time=\"2026-03-18T13:10:21Z\" level=info msg=\"log level info\"\ntime=\"2026-03-18T13:10:21Z\" level=info msg=\"TLS keys set, using https for metrics\"\ntime=\"2026-03-18T13:10:21Z\" level=info msg=\"No client CA provided, client certificate verification disabled\"\nW0318 13:10:21.674472 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.\ntime=\"2026-03-18T13:10:21Z\" level=info msg=\"Using in-cluster kube client config\"\ntime=\"2026-03-18T13:10:21Z\" level=info msg=\"Using in-cluster kube client config\"\nW0318 13:10:21.675806 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.\nError: error configuring catalog operator: the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)\nerror configuring catalog operator: the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)\n","startedAt":"2026-03-18T13:10:21Z","finishedAt":"2026-03-18T13:11:21Z","containerID":"cri-o://c6d06965eb2aa010cd8386f146e5e7d18099615f71beaf1a6e240f94bd2aecf0"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","containerID":"cri-o://d0f4426f9820f0b9e0e6d6fc6e2530dc463048378180953ea79d72f72fda3c7c","started":true,"volumeMounts":[{"name":"srv-cert","mountPath":"/srv-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-lxk9v","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}route-controller-manager_current.log0000640000000000000000000004717315156522256037420 0ustar0000000000000000config/pod/openshift-route-controller-manager/logs/route-controller-manager-c8888769b-8mxp62026-03-18T13:07:54.363509473Z I0318 13:07:54.362798 1 cmd.go:240] Using service-serving-cert provided certificates 2026-03-18T13:07:54.363509473Z I0318 13:07:54.362979 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:07:54.363509473Z I0318 13:07:54.363457 1 observer_polling.go:159] Starting file observer 2026-03-18T13:07:54.364097249Z I0318 13:07:54.363961 1 builder.go:298] route-controller-manager version 4.18.0-202602261953.p2.gce6ffa2.assembly.stream.el9-ce6ffa2-ce6ffa24dac3a5f49f70818e1159e40eaf27a6a3 2026-03-18T13:07:54.364809596Z I0318 13:07:54.364779 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:07:54.700272521Z I0318 13:07:54.700224 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-18T13:07:54.704036165Z I0318 13:07:54.704000 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-18T13:07:54.704036165Z I0318 13:07:54.704016 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-18T13:07:54.704063476Z I0318 13:07:54.704040 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-18T13:07:54.704063476Z I0318 13:07:54.704045 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-18T13:07:54.707136922Z I0318 13:07:54.707108 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:07:54.707136922Z W0318 13:07:54.707124 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:07:54.707136922Z W0318 13:07:54.707129 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:07:54.707136922Z W0318 13:07:54.707134 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:07:54.707161333Z W0318 13:07:54.707137 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:07:54.707161333Z W0318 13:07:54.707140 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:07:54.707161333Z W0318 13:07:54.707143 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:07:54.707331517Z I0318 13:07:54.707313 1 genericapiserver.go:514] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-18T13:07:54.711024579Z I0318 13:07:54.710985 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:07:54.711352368Z I0318 13:07:54.711327 1 leaderelection.go:250] attempting to acquire leader lease openshift-route-controller-manager/openshift-route-controllers... 2026-03-18T13:07:54.712161968Z I0318 13:07:54.712040 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController 2026-03-18T13:07:54.712161968Z I0318 13:07:54.712123 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:07:54.712161968Z I0318 13:07:54.712142 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:07:54.712161968Z I0318 13:07:54.712147 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:07:54.712193899Z I0318 13:07:54.712125 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:07:54.712193899Z I0318 13:07:54.712168 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:07:54.712203719Z I0318 13:07:54.712087 1 dynamic_serving_content.go:132] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:07:54.712354293Z I0318 13:07:54.712074 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773839229\" (2026-03-18 13:07:25 +0000 UTC to 2028-03-17 13:07:26 +0000 UTC (now=2026-03-18 13:07:54.712045585 +0000 UTC))" 2026-03-18T13:07:54.715477521Z I0318 13:07:54.712519 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839274\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839274\" (2026-03-18 12:07:54 +0000 UTC to 2027-03-18 12:07:54 +0000 UTC (now=2026-03-18 13:07:54.712495546 +0000 UTC))" 2026-03-18T13:07:54.715477521Z I0318 13:07:54.712539 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:07:54.715477521Z I0318 13:07:54.712577 1 genericapiserver.go:662] [graceful-termination] waiting for shutdown to be initiated 2026-03-18T13:07:54.715477521Z I0318 13:07:54.712592 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" 2026-03-18T13:07:54.715477521Z I0318 13:07:54.713640 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T13:07:54.715477521Z I0318 13:07:54.714020 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T13:07:54.715477521Z I0318 13:07:54.714705 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T13:07:54.723519762Z I0318 13:07:54.723452 1 leaderelection.go:260] successfully acquired lease openshift-route-controller-manager/openshift-route-controllers 2026-03-18T13:07:54.724072016Z I0318 13:07:54.723999 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-route-controller-manager", Name:"openshift-route-controllers", UID:"16b01b47-a0cc-489b-9fbc-270985cd617e", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"7863", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' route-controller-manager-c8888769b-8mxp6_88ad44ab-fb69-4862-b876-0932aac12301 became leader 2026-03-18T13:07:54.725071490Z I0318 13:07:54.725040 1 controller_manager.go:36] Starting "openshift.io/ingress-ip" 2026-03-18T13:07:54.725071490Z I0318 13:07:54.725057 1 controller_manager.go:46] Started "openshift.io/ingress-ip" 2026-03-18T13:07:54.725071490Z I0318 13:07:54.725062 1 controller_manager.go:36] Starting "openshift.io/ingress-to-route" 2026-03-18T13:07:54.746587158Z I0318 13:07:54.746533 1 ingress.go:262] ingress-to-route metrics registered with prometheus 2026-03-18T13:07:54.746587158Z I0318 13:07:54.746563 1 controller_manager.go:46] Started "openshift.io/ingress-to-route" 2026-03-18T13:07:54.746587158Z I0318 13:07:54.746570 1 controller_manager.go:48] Started Route Controllers 2026-03-18T13:07:54.746722032Z I0318 13:07:54.746699 1 ingress.go:313] Starting controller 2026-03-18T13:07:54.750818325Z W0318 13:07:54.750694 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T13:07:54.750818325Z E0318 13:07:54.750745 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T13:07:54.751051410Z I0318 13:07:54.751029 1 reflector.go:359] Caches populated for *v1.IngressClass from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T13:07:54.751177394Z I0318 13:07:54.751101 1 reflector.go:359] Caches populated for *v1.Ingress from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T13:07:54.769635304Z I0318 13:07:54.769575 1 reflector.go:359] Caches populated for *v1.Service from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T13:07:54.814236249Z I0318 13:07:54.812489 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:07:54.814236249Z I0318 13:07:54.812602 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:07:54.814236249Z I0318 13:07:54.812762 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 12:57:18 +0000 UTC to 2026-03-19 12:57:18 +0000 UTC (now=2026-03-18 13:07:54.812726932 +0000 UTC))" 2026-03-18T13:07:54.814236249Z I0318 13:07:54.812868 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:07:54.814236249Z I0318 13:07:54.812919 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773839229\" (2026-03-18 13:07:25 +0000 UTC to 2028-03-17 13:07:26 +0000 UTC (now=2026-03-18 13:07:54.812899246 +0000 UTC))" 2026-03-18T13:07:54.814236249Z I0318 13:07:54.813045 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839274\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839274\" (2026-03-18 12:07:54 +0000 UTC to 2027-03-18 12:07:54 +0000 UTC (now=2026-03-18 13:07:54.813028399 +0000 UTC))" 2026-03-18T13:07:54.814236249Z I0318 13:07:54.813188 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:50:06 +0000 UTC to 2036-03-15 12:50:06 +0000 UTC (now=2026-03-18 13:07:54.813171053 +0000 UTC))" 2026-03-18T13:07:54.814236249Z I0318 13:07:54.813208 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2026-03-19 12:57:20 +0000 UTC (now=2026-03-18 13:07:54.813196404 +0000 UTC))" 2026-03-18T13:07:54.814236249Z I0318 13:07:54.813224 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2027-03-18 12:57:20 +0000 UTC (now=2026-03-18 13:07:54.813213414 +0000 UTC))" 2026-03-18T13:07:54.814236249Z I0318 13:07:54.813242 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2027-03-18 12:57:20 +0000 UTC (now=2026-03-18 13:07:54.813231444 +0000 UTC))" 2026-03-18T13:07:54.814236249Z I0318 13:07:54.813258 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:57:18 +0000 UTC to 2036-03-15 12:57:18 +0000 UTC (now=2026-03-18 13:07:54.813247595 +0000 UTC))" 2026-03-18T13:07:54.814236249Z I0318 13:07:54.813275 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 12:57:18 +0000 UTC to 2026-03-19 12:57:18 +0000 UTC (now=2026-03-18 13:07:54.813264495 +0000 UTC))" 2026-03-18T13:07:54.814236249Z I0318 13:07:54.813443 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773839229\" (2026-03-18 13:07:25 +0000 UTC to 2028-03-17 13:07:26 +0000 UTC (now=2026-03-18 13:07:54.813402659 +0000 UTC))" 2026-03-18T13:07:54.814236249Z I0318 13:07:54.813651 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839274\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839274\" (2026-03-18 12:07:54 +0000 UTC to 2027-03-18 12:07:54 +0000 UTC (now=2026-03-18 13:07:54.813610154 +0000 UTC))" 2026-03-18T13:07:54.833435409Z I0318 13:07:54.830460 1 reflector.go:359] Caches populated for *v1.Secret from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-03-18T13:07:55.860773528Z W0318 13:07:55.860719 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T13:07:55.860773528Z E0318 13:07:55.860763 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T13:07:58.093716451Z W0318 13:07:58.093139 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T13:07:58.093716451Z E0318 13:07:58.093170 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server could not find the requested resource (get routes.route.openshift.io) 2026-03-18T13:08:03.655083548Z W0318 13:08:03.654984 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:08:03.655083548Z E0318 13:08:03.655032 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:08:11.272009455Z W0318 13:08:11.271768 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:08:11.272009455Z E0318 13:08:11.271798 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:08:34.819494079Z W0318 13:08:34.819447 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:08:34.819535090Z E0318 13:08:34.819488 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:09:08.470679380Z W0318 13:09:08.470614 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:09:08.470679380Z E0318 13:09:08.470649 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:09:28.735124761Z E0318 13:09:28.734953 1 leaderelection.go:340] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-18T13:10:01.417285453Z W0318 13:10:01.417171 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:10:01.417285453Z E0318 13:10:01.417226 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:10:28.737188958Z E0318 13:10:28.737079 1 leaderelection.go:347] error retrieving resource lock openshift-route-controller-manager/openshift-route-controllers: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io openshift-route-controllers) 2026-03-18T13:10:55.831452957Z W0318 13:10:55.831280 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:10:55.831452957Z E0318 13:10:55.831374 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:11:48.805279021Z W0318 13:11:48.805228 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:11:48.805324912Z E0318 13:11:48.805274 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) controller-manager_current.log0000640000000000000000000006015315156522256034201 0ustar0000000000000000config/pod/openshift-controller-manager/logs/controller-manager-fffb75699-b7pwr2026-03-18T13:11:23.046835092Z W0318 13:11:23.046805 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:11:23.046896543Z E0318 13:11:23.046866 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T13:11:23.047637026Z I0318 13:11:23.047600 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:23.048397857Z I0318 13:11:23.048373 1 reflector.go:368] Caches populated for *v1.Proxy from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:23.048911792Z I0318 13:11:23.048885 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:23.049091637Z I0318 13:11:23.049063 1 reflector.go:368] Caches populated for *v1.RoleBinding from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:23.049091637Z W0318 13:11:23.049081 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:11:23.049156309Z E0318 13:11:23.049121 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:11:23.049737525Z I0318 13:11:23.049714 1 reflector.go:368] Caches populated for *v1.Build from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:23.051865877Z W0318 13:11:23.051828 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:11:23.051880777Z E0318 13:11:23.051865 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:11:23.055258065Z W0318 13:11:23.055203 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T13:11:23.055282395Z E0318 13:11:23.055262 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:11:23.055880193Z I0318 13:11:23.055843 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:23.057045247Z I0318 13:11:23.057014 1 shared_informer.go:320] Caches are synced for ImagePullerRoleBindingController 2026-03-18T13:11:23.059052345Z I0318 13:11:23.058990 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:23.060303490Z I0318 13:11:23.060270 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_urls 2026-03-18T13:11:23.060316741Z I0318 13:11:23.060303 1 registry_urls_observation_controller.go:147] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_urls" 2026-03-18T13:11:23.063515003Z I0318 13:11:23.063473 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:23.069408733Z I0318 13:11:23.069358 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:23.091432038Z I0318 13:11:23.090186 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:23.096484104Z I0318 13:11:23.096230 1 factory.go:80] Deployer controller caches are synced. Starting workers. 2026-03-18T13:11:23.107110051Z I0318 13:11:23.107054 1 shared_informer.go:320] Caches are synced for BuilderRoleBindingController 2026-03-18T13:11:23.108759798Z I0318 13:11:23.108713 1 shared_informer.go:320] Caches are synced for DeployerRoleBindingController 2026-03-18T13:11:23.125765019Z I0318 13:11:23.125703 1 shared_informer.go:320] Caches are synced for service account 2026-03-18T13:11:23.139762902Z I0318 13:11:23.139655 1 shared_informer.go:320] Caches are synced for service account 2026-03-18T13:11:23.161299474Z I0318 13:11:23.161218 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret 2026-03-18T13:11:23.161299474Z I0318 13:11:23.161277 1 legacy_image_pull_secret_controller.go:138] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret" 2026-03-18T13:11:23.161348566Z I0318 13:11:23.161307 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-token-secret 2026-03-18T13:11:23.161348566Z I0318 13:11:23.161318 1 legacy_token_secret_controller.go:110] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-token-secret" 2026-03-18T13:11:23.161348566Z I0318 13:11:23.161333 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_image-pull-secret 2026-03-18T13:11:23.161362236Z I0318 13:11:23.161348 1 image_pull_secret_controller.go:398] Waiting for service account token signing cert to be observed 2026-03-18T13:11:23.161404847Z I0318 13:11:23.161363 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_service-account 2026-03-18T13:11:23.161449738Z I0318 13:11:23.161390 1 image_pull_secret_controller.go:384] Waiting for image registry urls to be observed 2026-03-18T13:11:23.161449738Z I0318 13:11:23.161406 1 service_account_controller.go:346] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_service-account" 2026-03-18T13:11:23.161517890Z I0318 13:11:23.161486 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_kids 2026-03-18T13:11:23.161586832Z I0318 13:11:23.161563 1 keyid_observation_controller.go:172] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_kids" 2026-03-18T13:11:23.161841420Z I0318 13:11:23.161816 1 image_pull_secret_controller.go:401] "Observed service account token signing certs" kids=["FYDbmpbKq8lxnJPqkaIgNwW4oc_LPpyMTOtft6mFGMk"] 2026-03-18T13:11:23.180889119Z I0318 13:11:23.180792 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:23.878073264Z W0318 13:11:23.877953 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T13:11:23.878073264Z E0318 13:11:23.878035 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:11:23.910878811Z W0318 13:11:23.910787 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T13:11:23.910878811Z E0318 13:11:23.910840 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T13:11:24.026546367Z W0318 13:11:24.026481 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:11:24.026717292Z E0318 13:11:24.026687 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:11:24.103302201Z W0318 13:11:24.103206 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:11:24.103380274Z E0318 13:11:24.103281 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:11:24.149730301Z W0318 13:11:24.149629 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:11:24.149812354Z E0318 13:11:24.149706 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:11:24.557396152Z W0318 13:11:24.557296 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:11:24.557396152Z E0318 13:11:24.557359 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T13:11:26.056761531Z W0318 13:11:26.056637 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:11:26.056761531Z E0318 13:11:26.056686 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:11:26.454294300Z W0318 13:11:26.454215 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:11:26.454294300Z E0318 13:11:26.454267 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T13:11:26.641751158Z W0318 13:11:26.641634 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T13:11:26.641751158Z E0318 13:11:26.641711 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T13:11:26.670184728Z W0318 13:11:26.670125 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:11:26.670184728Z E0318 13:11:26.670174 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:11:26.706521487Z W0318 13:11:26.706447 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T13:11:26.706558168Z E0318 13:11:26.706504 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:11:26.811909307Z W0318 13:11:26.811668 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:11:26.811909307Z E0318 13:11:26.811719 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:11:26.842336625Z I0318 13:11:26.842290 1 reflector.go:368] Caches populated for *v1.Event from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-03-18T13:11:30.035239892Z W0318 13:11:30.035162 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:11:30.035239892Z E0318 13:11:30.035211 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:11:30.919625138Z W0318 13:11:30.919579 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:11:30.919726011Z E0318 13:11:30.919709 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:11:31.148552112Z W0318 13:11:31.148031 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:11:31.148552112Z E0318 13:11:31.148082 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:11:31.979853555Z W0318 13:11:31.979772 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:11:31.979904427Z E0318 13:11:31.979844 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T13:11:32.295078486Z W0318 13:11:32.294995 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T13:11:32.295078486Z E0318 13:11:32.295055 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T13:11:32.742549237Z W0318 13:11:32.740551 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T13:11:32.742549237Z E0318 13:11:32.740595 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:11:37.754631328Z W0318 13:11:37.753886 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:11:37.754631328Z E0318 13:11:37.753944 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:11:38.856324213Z W0318 13:11:38.856248 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:11:38.856324213Z E0318 13:11:38.856299 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:11:39.246828240Z W0318 13:11:39.246780 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:11:39.246859771Z E0318 13:11:39.246819 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:11:40.704792945Z W0318 13:11:40.704717 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T13:11:40.704792945Z E0318 13:11:40.704765 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T13:11:41.204104612Z W0318 13:11:41.204036 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:11:41.204104612Z E0318 13:11:41.204094 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T13:11:41.701041010Z W0318 13:11:41.700987 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T13:11:41.701041010Z E0318 13:11:41.701031 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:11:51.975159926Z W0318 13:11:51.975040 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:11:51.975159926Z E0318 13:11:51.975104 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:11:54.504713776Z W0318 13:11:54.504647 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:11:54.504713776Z E0318 13:11:54.504692 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:12:00.701688378Z W0318 13:12:00.701638 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:12:00.701742270Z E0318 13:12:00.701695 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:12:01.155254380Z W0318 13:12:01.155146 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T13:12:01.155254380Z E0318 13:12:01.155191 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:12:03.351322348Z W0318 13:12:03.351275 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T13:12:03.351355259Z E0318 13:12:03.351319 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T13:12:06.299355274Z W0318 13:12:06.299274 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:12:06.299355274Z E0318 13:12:06.299332 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" controller-manager_previous.log0000640000000000000000000006253015156522256034374 0ustar0000000000000000config/pod/openshift-controller-manager/logs/controller-manager-fffb75699-b7pwr2026-03-18T13:07:58.441758160Z E0318 13:07:58.440717 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:07:58.654192850Z W0318 13:07:58.653427 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:07:58.654192850Z E0318 13:07:58.653478 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:07:58.771962464Z W0318 13:07:58.771916 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:07:58.771962464Z E0318 13:07:58.771954 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T13:07:58.855053361Z W0318 13:07:58.854356 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io) 2026-03-18T13:07:58.855053361Z E0318 13:07:58.854470 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server could not find the requested resource (get templateinstances.template.openshift.io)" 2026-03-18T13:07:59.204928986Z W0318 13:07:59.204626 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:07:59.204928986Z E0318 13:07:59.204666 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:08:02.242969332Z W0318 13:08:02.242845 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:08:02.242969332Z E0318 13:08:02.242908 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:08:03.392656379Z W0318 13:08:03.391706 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:08:03.392656379Z E0318 13:08:03.391799 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T13:08:03.515026348Z W0318 13:08:03.514931 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T13:08:03.515026348Z E0318 13:08:03.514985 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T13:08:03.566307529Z W0318 13:08:03.566079 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T13:08:03.566307529Z E0318 13:08:03.566123 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:08:03.695839727Z W0318 13:08:03.695761 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:08:03.695871998Z E0318 13:08:03.695836 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:08:04.302782578Z W0318 13:08:04.302682 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:08:04.302782578Z E0318 13:08:04.302755 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:08:10.399912447Z W0318 13:08:10.399818 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:08:10.399912447Z E0318 13:08:10.399865 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:08:10.472914272Z W0318 13:08:10.472842 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:08:10.472937712Z E0318 13:08:10.472903 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T13:08:13.011530094Z W0318 13:08:13.010365 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:08:13.011530094Z E0318 13:08:13.010462 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:08:13.169700028Z W0318 13:08:13.169623 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:08:13.169700028Z E0318 13:08:13.169672 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:08:14.054035731Z W0318 13:08:14.053947 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T13:08:14.054035731Z E0318 13:08:14.053986 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T13:08:15.239988244Z W0318 13:08:15.239944 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T13:08:15.240090947Z E0318 13:08:15.240072 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:08:27.304725555Z W0318 13:08:27.304478 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:08:27.304725555Z E0318 13:08:27.304524 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T13:08:27.994609886Z W0318 13:08:27.994460 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T13:08:27.994609886Z E0318 13:08:27.994520 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T13:08:29.528616520Z W0318 13:08:29.528513 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:08:29.528616520Z E0318 13:08:29.528578 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:08:32.265554838Z W0318 13:08:32.265400 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:08:32.265554838Z E0318 13:08:32.265490 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:08:37.106597378Z W0318 13:08:37.106501 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T13:08:37.106597378Z E0318 13:08:37.106569 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:08:38.063948456Z W0318 13:08:38.063643 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:08:38.063948456Z E0318 13:08:38.063708 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:08:55.065721267Z E0318 13:08:55.065675 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-18T13:08:55.582831287Z W0318 13:08:55.582758 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:08:55.582896689Z E0318 13:08:55.582825 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:09:00.989648388Z W0318 13:09:00.989586 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T13:09:00.989687759Z E0318 13:09:00.989639 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T13:09:06.672083613Z W0318 13:09:06.672024 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:09:06.672229297Z E0318 13:09:06.672206 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:09:09.313872700Z W0318 13:09:09.313743 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:09:09.313872700Z E0318 13:09:09.313817 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T13:09:14.455610077Z W0318 13:09:14.455502 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:09:14.455610077Z E0318 13:09:14.455546 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:09:22.311682540Z W0318 13:09:22.311575 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T13:09:22.311779323Z E0318 13:09:22.311665 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:09:48.758785152Z W0318 13:09:48.758681 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:09:48.758785152Z E0318 13:09:48.758742 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:09:49.617388796Z W0318 13:09:49.617235 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T13:09:49.617388796Z E0318 13:09:49.617301 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T13:09:55.068088746Z E0318 13:09:55.067871 1 leaderelection.go:436] error retrieving resource lock openshift-controller-manager/openshift-master-controllers: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io openshift-master-controllers) 2026-03-18T13:09:57.867869768Z W0318 13:09:57.867789 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:09:57.867869768Z E0318 13:09:57.867849 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:10:04.410820146Z W0318 13:10:04.410705 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-03-18T13:10:04.410820146Z E0318 13:10:04.410780 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-03-18T13:10:04.790159171Z W0318 13:10:04.790040 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:10:04.790159171Z E0318 13:10:04.790093 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:10:07.501114338Z W0318 13:10:07.501003 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-03-18T13:10:07.501114338Z E0318 13:10:07.501054 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-03-18T13:10:08.063495312Z I0318 13:10:08.063334 1 leaderelection.go:297] failed to renew lease openshift-controller-manager/openshift-master-controllers: timed out waiting for the condition 2026-03-18T13:10:21.073624386Z W0318 13:10:21.073507 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-03-18T13:10:21.073624386Z E0318 13:10:21.073590 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-03-18T13:10:24.498558835Z W0318 13:10:24.498477 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-03-18T13:10:24.498558835Z E0318 13:10:24.498526 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-03-18T13:10:39.628331895Z W0318 13:10:39.628216 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-03-18T13:10:39.628331895Z E0318 13:10:39.628277 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-03-18T13:10:42.066929961Z E0318 13:10:42.066862 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-18T13:10:42.067146318Z E0318 13:10:42.067120 1 image_trigger_controller.go:232] "Unhandled Error" err="timed out waiting for caches to sync" 2026-03-18T13:10:42.067232150Z E0318 13:10:42.067221 1 buildconfig_controller.go:208] "Unhandled Error" err="timed out waiting for caches to sync" 2026-03-18T13:10:42.067281681Z E0318 13:10:42.067272 1 build_controller.go:483] "Unhandled Error" err="timed out waiting for caches to sync" 2026-03-18T13:10:42.067313652Z E0318 13:10:42.067304 1 scheduled_image_controller.go:72] "Unhandled Error" err="timed out waiting for caches to sync" 2026-03-18T13:10:42.067335353Z I0318 13:10:42.067307 1 image_pull_secret_controller.go:445] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_image-pull-secret" 2026-03-18T13:10:42.067367314Z I0318 13:10:42.067358 1 image_pull_secret_controller.go:447] "Shutting down controller" name="openshift.io/internal-image-registry-pull-secrets_image-pull-secret" 2026-03-18T13:10:42.067402835Z E0318 13:10:42.067394 1 imagestream_controller.go:70] "Unhandled Error" err="timed out waiting for caches to sync" 2026-03-18T13:10:42.067573390Z I0318 13:10:42.067469 1 legacy_token_secret_controller.go:112] "Shutting down controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-token-secret" 2026-03-18T13:10:42.067608231Z I0318 13:10:42.067494 1 service_account_controller.go:348] "Shutting down controller" name="openshift.io/internal-image-registry-pull-secrets_service-account" 2026-03-18T13:10:42.067665622Z I0318 13:10:42.067630 1 serviceaccounts_controller.go:126] "Shutting down service account controller" 2026-03-18T13:10:42.067699313Z I0318 13:10:42.067512 1 legacy_image_pull_secret_controller.go:140] "Shutting down controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret" 2026-03-18T13:10:42.067707694Z I0318 13:10:42.067695 1 defaultrolebindings.go:166] Shutting down ImagePullerRoleBindingController 2026-03-18T13:10:42.067730614Z I0318 13:10:42.067527 1 keyid_observation_controller.go:174] "Shutting down controller" name="openshift.io/internal-image-registry-pull-secrets_kids" 2026-03-18T13:10:42.067730614Z I0318 13:10:42.067723 1 defaultrolebindings.go:166] Shutting down DeployerRoleBindingController 2026-03-18T13:10:42.067755585Z I0318 13:10:42.067342 1 factory.go:88] Shutting down deployer controller 2026-03-18T13:10:42.067755585Z I0318 13:10:42.067747 1 serviceaccounts_controller.go:126] "Shutting down service account controller" 2026-03-18T13:10:42.067764115Z I0318 13:10:42.067543 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-controller-manager", Name:"openshift-master-controllers", UID:"a1b7a78d-6641-44b3-8258-2e6703ea1fe2", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"7947", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' controller-manager-fffb75699-b7pwr stopped leading 2026-03-18T13:10:42.067771315Z I0318 13:10:42.067601 1 defaultrolebindings.go:166] Shutting down BuilderRoleBindingController 2026-03-18T13:10:42.067806916Z I0318 13:10:42.067782 1 registry_urls_observation_controller.go:149] "Shutting down controller" name="openshift.io/internal-image-registry-pull-secrets_urls" 2026-03-18T13:10:42.067861718Z I0318 13:10:42.067682 1 project_finalizer_controller.go:74] Shutting down 2026-03-18T13:10:42.069047443Z W0318 13:10:42.068132 1 controller_manager.go:108] Controller Manager received stop signal: leaderelection lost config/pod/openshift-controller-manager/controller-manager-fffb75699-b7pwr.json0000640000000000000000000001562415156522256026152 0ustar0000000000000000{"metadata":{"name":"controller-manager-fffb75699-b7pwr","generateName":"controller-manager-fffb75699-","namespace":"openshift-controller-manager","uid":"6a3f37a0-7a87-486e-90b9-d5e15d6ab4c0","resourceVersion":"9405","creationTimestamp":"2026-03-18T13:07:49Z","labels":{"app":"openshift-controller-manager-a","controller-manager":"true","openshift-route-controller-manager-anti-affinity":"true","pod-template-hash":"fffb75699"},"annotations":{"configmaps/client-ca":"7242","configmaps/config":"6253","configmaps/openshift-global-ca":"4562","configmaps/openshift-service-ca":"5374","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.53/23\"],\"mac_address\":\"0a:58:0a:80:00:35\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.53/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.53\"\n ],\n \"mac\": \"0a:58:0a:80:00:35\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","openshiftcontrollermanagers.operator.openshift.io/cluster":"2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"controller-manager-fffb75699","uid":"6826aed6-b16b-4115-b8d6-5e5c0895d5ca","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"client-ca","configMap":{"name":"client-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"proxy-ca-bundles","configMap":{"name":"openshift-global-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"kube-api-access-m5nvb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","command":["openshift-controller-manager","start"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"proxy-ca-bundles","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-m5nvb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":10},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000570000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-sa","serviceAccount":"openshift-controller-manager-sa","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c24,c9"},"runAsNonRoot":true,"fsGroup":1000570000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"openshift-controller-manager-a","controller-manager":"true","openshift-route-controller-manager-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:55Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:50Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:50Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.53","podIPs":[{"ip":"10.128.0.53"}],"startTime":"2026-03-18T13:07:50Z","containerStatuses":[{"name":"controller-manager","state":{"running":{"startedAt":"2026-03-18T13:11:06Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:07:54Z","finishedAt":"2026-03-18T13:10:42Z","containerID":"cri-o://bb553102326f2c4e518a7d4b30f5d51c49f697e05a25cafd876fd2a4683c379b"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","containerID":"cri-o://faa3ae234ab802023f31cbc58b44ed217cc96ae50b5b94a276ed5c1ebb501106","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"proxy-ca-bundles","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-m5nvb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator_current.log0000640000000000000000000001021115156522256045315 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-8c94f4649-cpqm52026-03-18T13:11:06.890392777Z I0318 13:11:06.890251 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:11:06.890392777Z I0318 13:11:06.890374 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:11:06.892386215Z I0318 13:11:06.891013 1 observer_polling.go:159] Starting file observer 2026-03-18T13:11:08.470624838Z I0318 13:11:08.470400 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602261953.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2026-03-18T13:11:09.313761783Z I0318 13:11:09.313672 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:11:09.313761783Z W0318 13:11:09.313707 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:09.313761783Z W0318 13:11:09.313712 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:09.313761783Z W0318 13:11:09.313717 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:11:09.313761783Z W0318 13:11:09.313721 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:11:09.313761783Z W0318 13:11:09.313725 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:11:09.313761783Z W0318 13:11:09.313728 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:11:09.315858813Z I0318 13:11:09.315799 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:11:09.316241534Z I0318 13:11:09.316203 1 leaderelection.go:254] attempting to acquire leader lease openshift-controller-manager-operator/openshift-controller-manager-operator-lock... 2026-03-18T13:11:09.316564664Z I0318 13:11:09.316486 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:11:09.316564664Z I0318 13:11:09.316501 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:11:09.316564664Z I0318 13:11:09.316540 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:09.316564664Z I0318 13:11:09.316545 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:11:09.316679437Z I0318 13:11:09.316581 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:11:09.316679437Z I0318 13:11:09.316658 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:09.317004256Z I0318 13:11:09.316922 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:11:09.317205192Z I0318 13:11:09.317145 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:11:09.317205192Z I0318 13:11:09.317177 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:11:09.423874009Z I0318 13:11:09.422514 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:09.423874009Z I0318 13:11:09.422566 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:11:09.423874009Z I0318 13:11:09.422655 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file openshift-controller-manager-operator_previous.log0000640000000000000000000000250315156522256045514 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-8c94f4649-cpqm52026-03-18T13:08:38.457185954Z I0318 13:08:38.456819 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:08:38.457571294Z I0318 13:08:38.457475 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:08:38.458312014Z I0318 13:08:38.458229 1 observer_polling.go:159] Starting file observer 2026-03-18T13:09:38.466298053Z W0318 13:09:38.466169 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-8c94f4649-cpqm5) 2026-03-18T13:09:38.466492538Z I0318 13:09:38.466447 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602261953.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2026-03-18T13:10:08.924969451Z F0318 13:10:08.924841 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock": context deadline exceeded openshift-controller-manager-operator-8c94f4649-cpqm5.json0000640000000000000000000001660115156522256033367 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8c94f4649-cpqm5","generateName":"openshift-controller-manager-operator-8c94f4649-","namespace":"openshift-controller-manager-operator","uid":"7dca7577-6bee-4dd3-917a-7b7ccc42f0fc","resourceVersion":"9409","creationTimestamp":"2026-03-18T13:05:33Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8c94f4649"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.5/23\"],\"mac_address\":\"0a:58:0a:80:00:05\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.5/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.5\"\n ],\n \"mac\": \"0a:58:0a:80:00:05\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8c94f4649","uid":"45eb87a4-9290-4a38-ac25-f03bc0aece66","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-qhs5w","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-qhs5w","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.5","podIPs":[{"ip":"10.128.0.5"}],"startTime":"2026-03-18T13:06:52Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-18T13:11:06Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 13:08:38.456819 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 13:08:38.457475 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 13:08:38.458229 1 observer_polling.go:159] Starting file observer\nW0318 13:09:38.466169 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-8c94f4649-cpqm5)\nI0318 13:09:38.466447 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602261953.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0318 13:10:08.924841 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-18T13:08:38Z","finishedAt":"2026-03-18T13:10:08Z","containerID":"cri-o://8dcf0d47755aa9729c9174b6d9eec6a76d4adc29a9ce8725fd5baba97772cee5"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","containerID":"cri-o://b5aaa571a68806249fc7d55159a4093df00ace03fbc9a12d84446e66a7f3e311","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-qhs5w","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-jx4mf/etcd-operator_current.log0000640000000000000000000001055315156522256031304 0ustar00000000000000002026-03-18T13:11:07.188911420Z I0318 13:11:07.188708 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-18T13:11:07.189823976Z I0318 13:11:07.189780 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:11:07.189836716Z I0318 13:11:07.189806 1 observer_polling.go:159] Starting file observer 2026-03-18T13:11:07.189871707Z I0318 13:11:07.189827 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:11:07.190445643Z I0318 13:11:07.190245 1 observer_polling.go:159] Starting file observer 2026-03-18T13:11:08.467899469Z I0318 13:11:08.467838 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602261953.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-18T13:11:08.657609112Z I0318 13:11:08.656280 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:11:08.657609112Z W0318 13:11:08.656315 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:08.657609112Z W0318 13:11:08.656321 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:08.657609112Z W0318 13:11:08.656332 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:11:08.657609112Z W0318 13:11:08.656336 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:11:08.657609112Z W0318 13:11:08.656340 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:11:08.657609112Z W0318 13:11:08.656343 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:11:08.659978191Z I0318 13:11:08.659954 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:11:08.660125895Z I0318 13:11:08.660002 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:11:08.660125895Z I0318 13:11:08.660042 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:11:08.660125895Z I0318 13:11:08.660105 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:11:08.660465935Z I0318 13:11:08.660219 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:11:08.660465935Z I0318 13:11:08.660321 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:11:08.660465935Z I0318 13:11:08.660328 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:08.660465935Z I0318 13:11:08.660343 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:11:08.660465935Z I0318 13:11:08.660348 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:08.761453148Z I0318 13:11:08.760535 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:08.761453148Z I0318 13:11:08.760609 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:11:08.761453148Z I0318 13:11:08.760695 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:09.281658857Z I0318 13:11:09.281559 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:11:09.281956015Z I0318 13:11:09.281886 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-jx4mf/etcd-operator_previous.log0000640000000000000000000004107015156522256031474 0ustar00000000000000002026-03-18T13:08:23.838037416Z I0318 13:08:23.837612 1 base_controller.go:113] All EtcdMembersController workers have been terminated 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837628 1 base_controller.go:123] Shutting down worker of EtcdCertCleanerController controller ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837641 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837649 1 base_controller.go:113] All ScriptController workers have been terminated 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837660 1 base_controller.go:123] Shutting down worker of FSyncController controller ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837667 1 base_controller.go:113] All FSyncController workers have been terminated 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837674 1 base_controller.go:113] All EtcdCertCleanerController workers have been terminated 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837705 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837706 1 base_controller.go:181] Shutting down etcd ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837730 1 base_controller.go:181] Shutting down EtcdCertSignerController ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837741 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837757 1 base_controller.go:181] Shutting down GuardController ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837773 1 base_controller.go:181] Shutting down etcd-Node ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837787 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837799 1 base_controller.go:181] Shutting down BootstrapTeardownController ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837816 1 base_controller.go:181] Shutting down MachineDeletionHooksController ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837846 1 base_controller.go:181] Shutting down StatusSyncer_etcd ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837850 1 base_controller.go:159] All StatusSyncer_etcd post start hooks have been terminated 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837864 1 base_controller.go:181] Shutting down EtcdEndpointsController ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837877 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837880 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837898 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-18T13:08:23.838037416Z I0318 13:08:23.837909 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-18T13:08:23.838490157Z I0318 13:08:23.838455 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:08:23.838535808Z I0318 13:08:23.838485 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-18T13:08:23.838535808Z I0318 13:08:23.838505 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:08:23.838848296Z E0318 13:08:23.838805 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-18T13:08:23.838848296Z I0318 13:08:23.838830 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-18T13:08:23.838848296Z I0318 13:08:23.838837 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-18T13:08:23.838875507Z I0318 13:08:23.838850 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2026-03-18T13:08:23.838875507Z I0318 13:08:23.838853 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-18T13:08:23.838875507Z I0318 13:08:23.838861 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-03-18T13:08:23.838875507Z I0318 13:08:23.838867 1 controller_manager.go:54] etcd-Node controller terminated 2026-03-18T13:08:23.838895118Z I0318 13:08:23.838873 1 base_controller.go:181] Shutting down EtcdStaticResources-StaticResources ... 2026-03-18T13:08:23.838895118Z I0318 13:08:23.838877 1 base_controller.go:123] Shutting down worker of MachineDeletionHooksController controller ... 2026-03-18T13:08:23.838895118Z I0318 13:08:23.838887 1 base_controller.go:113] All MachineDeletionHooksController workers have been terminated 2026-03-18T13:08:23.838915868Z E0318 13:08:23.838892 1 base_controller.go:279] "Unhandled Error" err="etcd-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"etcd-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-18T13:08:23.838934499Z I0318 13:08:23.838898 1 base_controller.go:123] Shutting down worker of StatusSyncer_etcd controller ... 2026-03-18T13:08:23.838957619Z I0318 13:08:23.838943 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-03-18T13:08:23.838976620Z I0318 13:08:23.838931 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-18T13:08:23.838997110Z I0318 13:08:23.838986 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-18T13:08:23.839012431Z I0318 13:08:23.839002 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-18T13:08:23.839089563Z I0318 13:08:23.839055 1 base_controller.go:181] Shutting down etcd-operator-UnsupportedConfigOverrides ... 2026-03-18T13:08:23.839089563Z I0318 13:08:23.839075 1 base_controller.go:123] Shutting down worker of etcd controller ... 2026-03-18T13:08:23.839106033Z I0318 13:08:23.839092 1 base_controller.go:113] All etcd workers have been terminated 2026-03-18T13:08:23.839106033Z I0318 13:08:23.839094 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-18T13:08:23.839121943Z I0318 13:08:23.839104 1 base_controller.go:123] Shutting down worker of etcd-operator-UnsupportedConfigOverrides controller ... 2026-03-18T13:08:23.839121943Z I0318 13:08:23.839115 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-18T13:08:23.839147194Z I0318 13:08:23.839123 1 builder.go:335] server exited 2026-03-18T13:08:23.839147194Z I0318 13:08:23.839123 1 base_controller.go:113] All etcd-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-18T13:08:23.839147194Z I0318 13:08:23.839137 1 controller_manager.go:54] etcd-operator-UnsupportedConfigOverrides controller terminated 2026-03-18T13:08:23.839164655Z I0318 13:08:23.839146 1 base_controller.go:181] Shutting down PruneController ... 2026-03-18T13:08:23.839183545Z I0318 13:08:23.839172 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-18T13:08:23.839183545Z I0318 13:08:23.838841 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-18T13:08:23.839199645Z I0318 13:08:23.839183 1 controller_manager.go:54] GuardController controller terminated 2026-03-18T13:08:23.839199645Z I0318 13:08:23.839186 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-18T13:08:23.839199645Z I0318 13:08:23.839195 1 controller_manager.go:54] PruneController controller terminated 2026-03-18T13:08:23.840387727Z I0318 13:08:23.840346 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-18T13:08:23.840459059Z I0318 13:08:23.840385 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-18T13:08:23.840459059Z I0318 13:08:23.840408 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-03-18T13:08:23.840481430Z I0318 13:08:23.840456 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-03-18T13:08:23.840481430Z I0318 13:08:23.840469 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-03-18T13:08:23.841316231Z E0318 13:08:23.841259 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:08:23.841828734Z E0318 13:08:23.841764 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/svc.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/services/etcd\": context canceled, \"etcd/sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/minimal-sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:08:23.841828734Z I0318 13:08:23.841810 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3408956161/tls.crt::/tmp/serving-cert-3408956161/tls.key" 2026-03-18T13:08:23.842539873Z I0318 13:08:23.842492 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-18T13:08:23.842569333Z I0318 13:08:23.842541 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-18T13:08:23.842569333Z I0318 13:08:23.842561 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-18T13:08:23.843626992Z I0318 13:08:23.843574 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-03-18T13:08:23.843626992Z I0318 13:08:23.843597 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-03-18T13:08:24.344560378Z I0318 13:08:24.343725 1 etcdcli_pool.go:70] creating a new cached client 2026-03-18T13:08:26.322352014Z I0318 13:08:26.322270 1 etcdcli_pool.go:70] creating a new cached client 2026-03-18T13:08:27.257092549Z I0318 13:08:27.257033 1 etcdcli_pool.go:70] creating a new cached client 2026-03-18T13:08:28.193339644Z I0318 13:08:28.193222 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="7d4d2587f2cd34e773e5f0154529df7ac5aed5adc821c2514fed15979103b9a1") 2026-03-18T13:08:28.193339644Z I0318 13:08:28.193285 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2026-03-18T13:08:28.193453968Z I0318 13:08:28.193385 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="4f40f286aefcd77a9e4659745799725596620d6899cb00bbb442d3afa62f4bac") 2026-03-18T13:08:28.193453968Z I0318 13:08:28.193399 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2026-03-18T13:08:28.193674504Z I0318 13:08:28.193607 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="0f6124e0bf3613fa9790d7c9e7609b2fb23bcb5e439fe86df83c3e2b700e515f") 2026-03-18T13:08:28.193674504Z I0318 13:08:28.193646 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2026-03-18T13:08:28.193802207Z I0318 13:08:28.193744 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="bbd2a03e055b8b35523f0b1659d3830e303e19c8e2f49c2d45b31bf5658bd1b3") 2026-03-18T13:08:28.193802207Z I0318 13:08:28.193766 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2026-03-18T13:08:28.193919840Z I0318 13:08:28.193857 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="eb0da9e7b57a109858acf1a75f8949c36cf13c21ac59d87571caa0cd2dcb0bfc") 2026-03-18T13:08:28.193919840Z I0318 13:08:28.193876 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2026-03-18T13:08:28.193995692Z I0318 13:08:28.193957 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="a48093c5fc3512d0923611b01149bd8c99895670e7fbebef05e47fe7a69ef279") 2026-03-18T13:08:28.193995692Z I0318 13:08:28.193974 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2026-03-18T13:08:28.835929337Z I0318 13:08:28.835828 1 observer_polling.go:162] Shutting down file observer 2026-03-18T13:08:39.344899740Z W0318 13:08:39.344847 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-18T13:08:39.346278477Z E0318 13:08:39.346256 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberRemovalController reconciliation failed: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries" 2026-03-18T13:08:39.347629241Z I0318 13:08:39.347568 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-03-18T13:08:39.347670842Z I0318 13:08:39.347644 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-03-18T13:08:41.324095751Z W0318 13:08:41.324034 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-18T13:08:41.324638785Z E0318 13:08:41.324605 1 base_controller.go:279] "Unhandled Error" err="EtcdEndpointsController reconciliation failed: failed to get member list: giving up getting a cached client after 3 tries" 2026-03-18T13:08:41.326047981Z I0318 13:08:41.325971 1 base_controller.go:123] Shutting down worker of EtcdEndpointsController controller ... 2026-03-18T13:08:41.326047981Z I0318 13:08:41.326034 1 base_controller.go:113] All EtcdEndpointsController workers have been terminated 2026-03-18T13:08:42.258081646Z W0318 13:08:42.257993 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-18T13:08:42.258219530Z E0318 13:08:42.258194 1 base_controller.go:279] "Unhandled Error" err="BootstrapTeardownController reconciliation failed: error while canRemoveEtcdBootstrap: giving up getting a cached client after 3 tries" 2026-03-18T13:08:42.259502804Z I0318 13:08:42.259459 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-03-18T13:08:42.259654598Z I0318 13:08:42.259634 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-03-18T13:08:57.840016982Z E0318 13:08:57.839975 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-18T13:08:57.840083434Z W0318 13:08:57.840074 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-jx4mf.json0000640000000000000000000001576315156522256024226 0ustar0000000000000000{"metadata":{"name":"etcd-operator-8544cbcf9c-jx4mf","generateName":"etcd-operator-8544cbcf9c-","namespace":"openshift-etcd-operator","uid":"19a76585-a9ac-4ed9-9146-bb77b31848c6","resourceVersion":"9418","creationTimestamp":"2026-03-18T13:05:34Z","labels":{"app":"etcd-operator","pod-template-hash":"8544cbcf9c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-8544cbcf9c","uid":"311bacf7-9d69-4cce-ae95-a9aa5b1bc6b8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-w9zbp","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-w9zbp","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-03-18T13:06:52Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-18T13:11:07Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:07:08Z","finishedAt":"2026-03-18T13:08:57Z","containerID":"cri-o://e98d728f4b1b0e813247323f6966121eae00b055f966e7db7eab7c672af9c4da"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","containerID":"cri-o://f3d6a2875cca50d672dfde1a32c8dca9e65a425957da660e57609821797e598b","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-w9zbp","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002746115156522256033721 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-85b59d8688-wd26k2026-03-18T13:07:50.495712417Z W0318 13:07:50.494293 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-18T13:07:50.495712417Z I0318 13:07:50.494766 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773839270 cert, and key in /tmp/serving-cert-1834430174/serving-signer.crt, /tmp/serving-cert-1834430174/serving-signer.key 2026-03-18T13:07:50.756234029Z I0318 13:07:50.755829 1 observer_polling.go:159] Starting file observer 2026-03-18T13:07:50.770373712Z I0318 13:07:50.770262 1 builder.go:304] check-endpoints version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-18T13:07:50.771231684Z I0318 13:07:50.771182 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-1834430174/tls.crt::/tmp/serving-cert-1834430174/tls.key" 2026-03-18T13:07:51.215120148Z I0318 13:07:51.215001 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-18T13:07:51.216752949Z I0318 13:07:51.216732 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-18T13:07:51.216792060Z I0318 13:07:51.216782 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-18T13:07:51.216836442Z I0318 13:07:51.216827 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-18T13:07:51.216861442Z I0318 13:07:51.216853 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-18T13:07:51.222665927Z I0318 13:07:51.221835 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:07:51.222735459Z W0318 13:07:51.222720 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:07:51.222764100Z W0318 13:07:51.222753 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:07:51.222791100Z W0318 13:07:51.222781 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:07:51.222816901Z W0318 13:07:51.222807 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:07:51.222847332Z W0318 13:07:51.222837 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:07:51.222873032Z W0318 13:07:51.222863 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:07:51.222917663Z I0318 13:07:51.222284 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-18T13:07:51.225991750Z I0318 13:07:51.225955 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:07:51.226011541Z I0318 13:07:51.225994 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:07:51.226021941Z I0318 13:07:51.225992 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:07:51.226021941Z I0318 13:07:51.226006 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:07:51.226066452Z I0318 13:07:51.226034 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:07:51.226076322Z I0318 13:07:51.226066 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:07:51.226135694Z I0318 13:07:51.226110 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T13:07:51.226135694Z I0318 13:07:51.226126 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T13:07:51.226427252Z I0318 13:07:51.226369 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1834430174/tls.crt::/tmp/serving-cert-1834430174/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773839270\" (2026-03-18 13:07:49 +0000 UTC to 2026-04-17 13:07:50 +0000 UTC (now=2026-03-18 13:07:51.225918988 +0000 UTC))" 2026-03-18T13:07:51.226493694Z I0318 13:07:51.226472 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-1834430174/tls.crt::/tmp/serving-cert-1834430174/tls.key" 2026-03-18T13:07:51.226714499Z I0318 13:07:51.226690 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839271\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839270\" (2026-03-18 12:07:50 +0000 UTC to 2027-03-18 12:07:50 +0000 UTC (now=2026-03-18 13:07:51.226668708 +0000 UTC))" 2026-03-18T13:07:51.226724979Z I0318 13:07:51.226714 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-18T13:07:51.226758170Z I0318 13:07:51.226739 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-18T13:07:51.226767120Z I0318 13:07:51.226757 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:07:51.227235082Z I0318 13:07:51.227218 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-18T13:07:51.227826656Z I0318 13:07:51.227788 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:07:51.229064747Z I0318 13:07:51.229020 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:07:51.229441917Z I0318 13:07:51.229392 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:07:51.326431161Z I0318 13:07:51.326319 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:07:51.326465632Z I0318 13:07:51.326338 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:07:51.330018650Z I0318 13:07:51.329971 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 12:57:18 +0000 UTC to 2026-03-19 12:57:18 +0000 UTC (now=2026-03-18 13:07:51.329916598 +0000 UTC))" 2026-03-18T13:07:51.330276277Z I0318 13:07:51.330244 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1834430174/tls.crt::/tmp/serving-cert-1834430174/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773839270\" (2026-03-18 13:07:49 +0000 UTC to 2026-04-17 13:07:50 +0000 UTC (now=2026-03-18 13:07:51.330215036 +0000 UTC))" 2026-03-18T13:07:51.330509913Z I0318 13:07:51.326390 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:07:51.330535974Z I0318 13:07:51.330463 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839271\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839270\" (2026-03-18 12:07:50 +0000 UTC to 2027-03-18 12:07:50 +0000 UTC (now=2026-03-18 13:07:51.330442642 +0000 UTC))" 2026-03-18T13:07:51.331047957Z I0318 13:07:51.331005 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:50:06 +0000 UTC to 2036-03-15 12:50:06 +0000 UTC (now=2026-03-18 13:07:51.330971375 +0000 UTC))" 2026-03-18T13:07:51.331062707Z I0318 13:07:51.331047 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2026-03-19 12:57:20 +0000 UTC (now=2026-03-18 13:07:51.331030066 +0000 UTC))" 2026-03-18T13:07:51.331093878Z I0318 13:07:51.331073 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2027-03-18 12:57:20 +0000 UTC (now=2026-03-18 13:07:51.331055497 +0000 UTC))" 2026-03-18T13:07:51.331170960Z I0318 13:07:51.331135 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2027-03-18 12:57:20 +0000 UTC (now=2026-03-18 13:07:51.331084907 +0000 UTC))" 2026-03-18T13:07:51.331170960Z I0318 13:07:51.331162 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:57:18 +0000 UTC to 2036-03-15 12:57:18 +0000 UTC (now=2026-03-18 13:07:51.331146399 +0000 UTC))" 2026-03-18T13:07:51.331209170Z I0318 13:07:51.331183 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 12:57:18 +0000 UTC to 2026-03-19 12:57:18 +0000 UTC (now=2026-03-18 13:07:51.33117001 +0000 UTC))" 2026-03-18T13:07:51.332036291Z I0318 13:07:51.331361 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1834430174/tls.crt::/tmp/serving-cert-1834430174/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773839270\" (2026-03-18 13:07:49 +0000 UTC to 2026-04-17 13:07:50 +0000 UTC (now=2026-03-18 13:07:51.331340424 +0000 UTC))" 2026-03-18T13:07:51.332036291Z I0318 13:07:51.331551 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839271\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839270\" (2026-03-18 12:07:50 +0000 UTC to 2027-03-18 12:07:50 +0000 UTC (now=2026-03-18 13:07:51.331531548 +0000 UTC))" 2026-03-18T13:07:51.540212525Z I0318 13:07:51.539788 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:07:51.627538678Z I0318 13:07:51.627469 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-18T13:07:51.627538678Z I0318 13:07:51.627499 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-85b59d8688-wd26k/openshift-apiserver_current.log0000640000000000000000000011666015156522256030724 0ustar00000000000000002026-03-18T13:11:19.867364091Z E0318 13:11:19.867301 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:19.867506175Z E0318 13:11:19.867338 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:19.867506175Z E0318 13:11:19.867462 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:19.867759392Z E0318 13:11:19.867239 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:19.869362529Z http2: server: error reading preface from client 10.128.0.2:60208: read tcp 10.128.0.40:8443->10.128.0.2:60208: read: connection reset by peer 2026-03-18T13:11:20.382099512Z E0318 13:11:20.381997 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.382099512Z E0318 13:11:20.382068 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.382099512Z E0318 13:11:20.382066 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.382342849Z E0318 13:11:20.382229 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.382452252Z E0318 13:11:20.382231 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.601550 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.601589 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.601649 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.601652 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.601771 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.601847 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.601878 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.601973 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.602015 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.602019 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.601559 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.602138 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604355710Z E0318 13:11:41.602212 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604877187Z E0318 13:11:41.604853 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.604877187Z E0318 13:11:41.604864 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.610753810Z E0318 13:11:41.610715 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.610872424Z E0318 13:11:41.610847 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.611057380Z E0318 13:11:41.611034 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.611164093Z E0318 13:11:41.611142 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.611286607Z E0318 13:11:41.611265 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.611506744Z E0318 13:11:41.611483 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.611742352Z E0318 13:11:41.611717 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.611964359Z E0318 13:11:41.611944 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.612146725Z E0318 13:11:41.612125 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.612520678Z E0318 13:11:41.612496 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.612700174Z E0318 13:11:41.612677 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.612799548Z E0318 13:11:41.612780 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.612856779Z E0318 13:11:41.612838 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.612984154Z E0318 13:11:41.612966 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.613026745Z E0318 13:11:41.613006 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.613026745Z E0318 13:11:41.613021 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.613146639Z E0318 13:11:41.613129 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.613174790Z E0318 13:11:41.613154 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.613174790Z E0318 13:11:41.613168 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.613251372Z E0318 13:11:41.613226 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.613298174Z E0318 13:11:41.613281 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.613373116Z E0318 13:11:41.612966 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.613373116Z E0318 13:11:41.613286 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.613373116Z E0318 13:11:41.613353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.613386717Z E0318 13:11:41.613226 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.624675558Z E0318 13:11:41.622934 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.624675558Z E0318 13:11:41.623023 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.624675558Z E0318 13:11:41.623024 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.624675558Z E0318 13:11:41.623372 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.624826503Z E0318 13:11:41.624797 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.892892523Z E0318 13:11:48.892840 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.892954955Z E0318 13:11:48.892927 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.892954955Z E0318 13:11:48.892941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.892965485Z E0318 13:11:48.892941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.893024397Z E0318 13:11:48.892998 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.893121210Z E0318 13:11:48.892840 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.893178163Z E0318 13:11:48.893138 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.893189044Z E0318 13:11:48.893177 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.893321768Z E0318 13:11:48.893244 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.893321768Z E0318 13:11:48.893296 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.893336998Z E0318 13:11:48.893249 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.893372089Z E0318 13:11:48.893349 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.893372089Z E0318 13:11:48.893158 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.893424951Z E0318 13:11:48.893379 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.893477193Z E0318 13:11:48.893450 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.960101744Z E0318 13:11:48.958584 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.960101744Z E0318 13:11:48.958637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.960101744Z E0318 13:11:48.958787 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.960101744Z E0318 13:11:48.958584 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.964100786Z E0318 13:11:48.964062 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.987154314Z E0318 13:11:48.987087 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.987425933Z E0318 13:11:48.987393 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.987650170Z E0318 13:11:48.987619 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.987816896Z E0318 13:11:48.987784 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:48.988056554Z E0318 13:11:48.987941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.174187638Z E0318 13:11:49.174128 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.174187638Z E0318 13:11:49.174152 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.174251390Z E0318 13:11:49.174152 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.174340553Z E0318 13:11:49.174152 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.174452696Z E0318 13:11:49.174235 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.614245015Z E0318 13:11:49.614178 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.617439170Z E0318 13:11:49.614826 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.617439170Z E0318 13:11:49.615008 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.617439170Z E0318 13:11:49.615060 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.617439170Z E0318 13:11:49.615128 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.876407609Z E0318 13:11:49.876334 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.876568345Z E0318 13:11:49.876529 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.876780452Z E0318 13:11:49.876746 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.876913057Z E0318 13:11:49.876883 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:49.877017470Z E0318 13:11:49.876989 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:50.392894602Z E0318 13:11:50.392832 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:50.392932853Z E0318 13:11:50.392896 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:50.392996585Z E0318 13:11:50.392959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:50.393016836Z E0318 13:11:50.392996 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:50.393080348Z E0318 13:11:50.393043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315156522256037746 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-4bqf92026-03-18T13:10:21.638958668Z I0318 13:10:21.638692 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:10:21.638958668Z I0318 13:10:21.638911 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:10:21.639784589Z I0318 13:10:21.639702 1 observer_polling.go:159] Starting file observer 2026-03-18T13:11:08.468599809Z I0318 13:11:08.467146 1 builder.go:304] openshift-apiserver-operator version - 2026-03-18T13:11:08.825533247Z I0318 13:11:08.825476 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:11:08.825533247Z W0318 13:11:08.825516 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:08.825533247Z W0318 13:11:08.825521 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:08.825564128Z W0318 13:11:08.825529 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:11:08.825564128Z W0318 13:11:08.825536 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:11:08.825564128Z W0318 13:11:08.825540 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:11:08.825564128Z W0318 13:11:08.825546 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:11:08.832094316Z I0318 13:11:08.832039 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:11:08.832094316Z I0318 13:11:08.832082 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:11:08.832219470Z I0318 13:11:08.832126 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:11:08.832219470Z I0318 13:11:08.832158 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:08.832219470Z I0318 13:11:08.832188 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:11:08.832219470Z I0318 13:11:08.832195 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:08.832322153Z I0318 13:11:08.832290 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:11:08.832353344Z I0318 13:11:08.832335 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:11:08.832487467Z I0318 13:11:08.832459 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:11:08.932407940Z I0318 13:11:08.932265 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:08.932407940Z I0318 13:11:08.932326 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:11:08.932407940Z I0318 13:11:08.932303 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:09.288027910Z I0318 13:11:09.287674 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:11:09.291089479Z I0318 13:11:09.288235 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... openshift-apiserver-operator_previous.log0000640000000000000000000004343415156522256040155 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-4bqf92026-03-18T13:08:07.867929310Z I0318 13:08:07.860310 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:08:07.901485038Z E0318 13:08:07.894547 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_openshift-apiserver reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"openshift-apiserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T13:08:07.924493823Z I0318 13:08:07.923988 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:08:07.974073693Z E0318 13:08:07.968287 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T13:08:07.974073693Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401 2026-03-18T13:08:07.974073693Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T13:08:07.974073693Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401 2026-03-18T13:08:07.974073693Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401 2026-03-18T13:08:07.974073693Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401 2026-03-18T13:08:07.974073693Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401 2026-03-18T13:08:07.974073693Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401 2026-03-18T13:08:07.974073693Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401 2026-03-18T13:08:07.974073693Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401 2026-03-18T13:08:07.974073693Z > 2026-03-18T13:08:17.950291562Z I0318 13:08:17.950173 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="37f0a882ec3f04b61530a5f7e546240d79c9459ca139f5653f35fe41423d22d8") 2026-03-18T13:08:17.950291562Z W0318 13:08:17.950224 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-18T13:08:17.950291562Z I0318 13:08:17.950283 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="8584cbab6817a894c7fde51fa1fbd14c45f0e680b6d07d8b03597e5a84d22e76") 2026-03-18T13:08:17.950621241Z I0318 13:08:17.950536 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-18T13:08:17.950621241Z E0318 13:08:17.950543 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-18T13:08:17.950621241Z I0318 13:08:17.950574 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-18T13:08:17.950621241Z I0318 13:08:17.950585 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-18T13:08:17.950660572Z E0318 13:08:17.950637 1 leaderelection.go:436] error retrieving resource lock openshift-apiserver-operator/openshift-apiserver-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-18T13:08:17.950660572Z I0318 13:08:17.950651 1 leaderelection.go:297] failed to renew lease openshift-apiserver-operator/openshift-apiserver-operator-lock: timed out waiting for the condition 2026-03-18T13:08:17.950862717Z I0318 13:08:17.950736 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-18T13:08:17.950862717Z I0318 13:08:17.950793 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-18T13:08:17.950862717Z I0318 13:08:17.950824 1 base_controller.go:181] Shutting down openshift-apiserver ... 2026-03-18T13:08:17.950862717Z I0318 13:08:17.950827 1 base_controller.go:181] Shutting down StatusSyncer_openshift-apiserver ... 2026-03-18T13:08:17.950862717Z I0318 13:08:17.950827 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-18T13:08:17.950862717Z I0318 13:08:17.950838 1 base_controller.go:159] All StatusSyncer_openshift-apiserver post start hooks have been terminated 2026-03-18T13:08:17.950862717Z I0318 13:08:17.950843 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-03-18T13:08:17.950862717Z I0318 13:08:17.950846 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-18T13:08:17.950929209Z I0318 13:08:17.950867 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-18T13:08:17.950929209Z I0318 13:08:17.950874 1 base_controller.go:181] Shutting down openshift-apiserver-RemoveStaleConditions ... 2026-03-18T13:08:17.950929209Z I0318 13:08:17.950891 1 base_controller.go:181] Shutting down openshift-apiserver-UnsupportedConfigOverrides ... 2026-03-18T13:08:17.950929209Z I0318 13:08:17.950909 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-18T13:08:17.950929209Z I0318 13:08:17.950918 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-18T13:08:17.950954189Z I0318 13:08:17.950925 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-apiserver ... 2026-03-18T13:08:17.950954189Z I0318 13:08:17.950932 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-18T13:08:17.950954189Z I0318 13:08:17.950943 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-18T13:08:17.951025021Z E0318 13:08:17.950977 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.build.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:08:17.951025021Z I0318 13:08:17.951000 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1925513098/tls.crt::/tmp/serving-cert-1925513098/tls.key" 2026-03-18T13:08:17.951052632Z I0318 13:08:17.951036 1 base_controller.go:181] Shutting down OpenShiftAPIServer-WorkloadWorkloadController ... 2026-03-18T13:08:17.951110763Z I0318 13:08:17.951072 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-18T13:08:17.951110763Z I0318 13:08:17.951085 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-18T13:08:17.951110763Z I0318 13:08:17.951090 1 builder.go:335] server exited 2026-03-18T13:08:17.951110763Z E0318 13:08:17.951067 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled" 2026-03-18T13:08:17.951136164Z I0318 13:08:17.951123 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionKey ... 2026-03-18T13:08:17.951136164Z I0318 13:08:17.951124 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionCondition ... 2026-03-18T13:08:17.951155465Z I0318 13:08:17.951142 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionState ... 2026-03-18T13:08:17.951183805Z I0318 13:08:17.951152 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionMigration ... 2026-03-18T13:08:17.951183805Z I0318 13:08:17.951154 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-18T13:08:17.951183805Z I0318 13:08:17.951159 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionCondition controller ... 2026-03-18T13:08:17.951183805Z I0318 13:08:17.951164 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-18T13:08:17.951183805Z I0318 13:08:17.951170 1 base_controller.go:113] All openshift-apiserver-EncryptionCondition workers have been terminated 2026-03-18T13:08:17.951183805Z I0318 13:08:17.951174 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionPrune ... 2026-03-18T13:08:17.951207746Z I0318 13:08:17.951180 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-18T13:08:17.951207746Z I0318 13:08:17.951202 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionPrune controller ... 2026-03-18T13:08:17.951227076Z I0318 13:08:17.951209 1 base_controller.go:113] All openshift-apiserver-EncryptionPrune workers have been terminated 2026-03-18T13:08:17.951227076Z I0318 13:08:17.951207 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-apiserver controller ... 2026-03-18T13:08:17.951247027Z I0318 13:08:17.951225 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-18T13:08:17.951247027Z I0318 13:08:17.951232 1 base_controller.go:113] All StatusSyncer_openshift-apiserver workers have been terminated 2026-03-18T13:08:17.951247027Z I0318 13:08:17.951184 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionKey controller ... 2026-03-18T13:08:17.951267657Z I0318 13:08:17.951236 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-18T13:08:17.951267657Z I0318 13:08:17.951195 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionMigration controller ... 2026-03-18T13:08:17.951267657Z I0318 13:08:17.951253 1 base_controller.go:123] Shutting down worker of openshift-apiserver-UnsupportedConfigOverrides controller ... 2026-03-18T13:08:17.951288938Z I0318 13:08:17.951264 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-18T13:08:17.951288938Z I0318 13:08:17.951270 1 base_controller.go:113] All openshift-apiserver-UnsupportedConfigOverrides workers have been terminated 2026-03-18T13:08:17.951288938Z I0318 13:08:17.951272 1 base_controller.go:113] All openshift-apiserver-EncryptionMigration workers have been terminated 2026-03-18T13:08:17.951288938Z I0318 13:08:17.951276 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:08:17.951310339Z I0318 13:08:17.951287 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:08:17.951310339Z I0318 13:08:17.951290 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-18T13:08:17.951310339Z I0318 13:08:17.951302 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-18T13:08:17.951331459Z I0318 13:08:17.951312 1 base_controller.go:123] Shutting down worker of openshift-apiserver-RemoveStaleConditions controller ... 2026-03-18T13:08:17.951331459Z I0318 13:08:17.951314 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-18T13:08:17.951331459Z I0318 13:08:17.951321 1 base_controller.go:113] All openshift-apiserver-RemoveStaleConditions workers have been terminated 2026-03-18T13:08:17.951359870Z I0318 13:08:17.951203 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-18T13:08:17.951359870Z I0318 13:08:17.951254 1 base_controller.go:123] Shutting down worker of openshift-apiserver controller ... 2026-03-18T13:08:17.951359870Z I0318 13:08:17.951351 1 base_controller.go:113] All openshift-apiserver workers have been terminated 2026-03-18T13:08:17.951379950Z I0318 13:08:17.951246 1 base_controller.go:113] All openshift-apiserver-EncryptionKey workers have been terminated 2026-03-18T13:08:17.951379950Z I0318 13:08:17.951019 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-03-18T13:08:17.951399171Z I0318 13:08:17.951384 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-18T13:08:17.951457562Z I0318 13:08:17.951191 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionState controller ... 2026-03-18T13:08:17.951490083Z I0318 13:08:17.951459 1 base_controller.go:113] All openshift-apiserver-EncryptionState workers have been terminated 2026-03-18T13:08:17.951490083Z I0318 13:08:17.951470 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-18T13:08:17.951916365Z E0318 13:08:17.951828 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-18T13:08:17.952093810Z I0318 13:08:17.952017 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-18T13:08:17.952093810Z I0318 13:08:17.952042 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-18T13:08:17.952223463Z I0318 13:08:17.952154 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-apiserver controller ... 2026-03-18T13:08:17.952223463Z I0318 13:08:17.952175 1 base_controller.go:113] All NamespaceFinalizerController_openshift-apiserver workers have been terminated 2026-03-18T13:08:17.952944362Z I0318 13:08:17.952857 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-18T13:08:17.952944362Z I0318 13:08:17.952875 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-18T13:08:17.953197718Z E0318 13:08:17.953146 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"v3.11.0/openshift-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled, \"v3.11.0/openshift-apiserver/apiserver-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:08:17.954128312Z E0318 13:08:17.954023 1 base_controller.go:279] "Unhandled Error" err="OpenShiftAPIServer-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OpenShiftAPIServer-Workload\": client rate limiter Wait returned an error: context canceled" 2026-03-18T13:08:17.955106858Z I0318 13:08:17.954996 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-18T13:08:17.955106858Z I0318 13:08:17.955039 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-18T13:08:17.955106858Z I0318 13:08:17.955066 1 base_controller.go:123] Shutting down worker of OpenShiftAPIServer-WorkloadWorkloadController controller ... 2026-03-18T13:08:17.955106858Z I0318 13:08:17.955080 1 base_controller.go:113] All OpenShiftAPIServer-WorkloadWorkloadController workers have been terminated 2026-03-18T13:08:22.949670983Z I0318 13:08:22.949619 1 observer_polling.go:162] Shutting down file observer 2026-03-18T13:08:51.954627971Z E0318 13:08:51.954550 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-18T13:08:51.954627971Z W0318 13:08:51.954589 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-4bqf9.json0000640000000000000000000001442615156522256027675 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-d65958b8-4bqf9","generateName":"openshift-apiserver-operator-d65958b8-","namespace":"openshift-apiserver-operator","uid":"0c2c4a58-9780-4ecd-b417-e590ac3576ed","resourceVersion":"9380","creationTimestamp":"2026-03-18T13:05:35Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"d65958b8"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-d65958b8","uid":"53951852-e2f3-4e54-8ec2-71d9c756f1a9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-v6zmc","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-v6zmc","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c0"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:06Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:06Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-03-18T13:06:52Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-18T13:10:21Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:07:07Z","finishedAt":"2026-03-18T13:08:51Z","containerID":"cri-o://8e530c2314387d6faa3389f896853faadcabf48e6b1056d8665d0aee6b25ba83"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","containerID":"cri-o://ece7f8de2256ca4c5499a6c68682a60215b1ff9074f8ada25360681bd459a76c","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-v6zmc","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515156522256043057 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-zm5rd2026-03-18T13:11:07.133956314Z I0318 13:11:07.133367 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:11:07.133956314Z I0318 13:11:07.133493 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:11:07.134373196Z I0318 13:11:07.134342 1 observer_polling.go:159] Starting file observer 2026-03-18T13:11:08.473459219Z I0318 13:11:08.467235 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202603040208.p2.g4e99db6.assembly.stream.el9-4e99db6-4e99db62cea1d2ca48765230c6f5663d1f2c2702 2026-03-18T13:11:08.858045845Z I0318 13:11:08.857978 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:11:08.858045845Z W0318 13:11:08.858016 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:08.858045845Z W0318 13:11:08.858023 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:08.858045845Z W0318 13:11:08.858034 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:11:08.858045845Z W0318 13:11:08.858038 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:11:08.858079396Z W0318 13:11:08.858042 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:11:08.858079396Z W0318 13:11:08.858046 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:11:08.860881216Z I0318 13:11:08.860840 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:11:08.860950718Z I0318 13:11:08.860927 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:11:08.860971829Z I0318 13:11:08.860957 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:11:08.861021910Z I0318 13:11:08.860988 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:11:08.861141464Z I0318 13:11:08.861118 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:11:08.861261168Z I0318 13:11:08.861237 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:11:08.861261168Z I0318 13:11:08.861257 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:08.861286259Z I0318 13:11:08.861270 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:11:08.861286259Z I0318 13:11:08.861282 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:08.961258603Z I0318 13:11:08.961147 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:11:08.961322354Z I0318 13:11:08.961288 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:08.961483629Z I0318 13:11:08.961382 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:09.288559326Z I0318 13:11:09.288209 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:11:09.288609127Z I0318 13:11:09.288586 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... kube-scheduler-operator-container_previous.log0000640000000000000000000004327015156522256043260 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-zm5rd2026-03-18T13:07:52.111113964Z I0318 13:07:52.110619 1 request.go:700] Waited for 1.164645481s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-3-master-0 2026-03-18T13:07:53.120575746Z I0318 13:07:53.120484 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"31ad75bf-35e4-4406-95bf-611ae42f6a5d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing 2026-03-18T13:07:53.912329906Z I0318 13:07:53.912273 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Pending phase 2026-03-18T13:07:54.309940174Z I0318 13:07:54.309873 1 request.go:700] Waited for 1.18903878s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/openshift-kube-scheduler-master-0 2026-03-18T13:07:55.312166305Z I0318 13:07:55.310090 1 request.go:700] Waited for 1.195855641s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller 2026-03-18T13:07:56.218138740Z I0318 13:07:56.214483 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-18T13:07:58.724054326Z I0318 13:07:58.724021 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-18T13:08:00.313784031Z I0318 13:08:00.312863 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-18T13:08:03.424769352Z I0318 13:08:03.424659 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2026-03-18T13:08:27.854631343Z I0318 13:08:27.854557 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="98019597941867bc1419442f33f3696dc8484fc2bf7b74c12220de54cbe3f139") 2026-03-18T13:08:27.854631343Z W0318 13:08:27.854618 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-18T13:08:27.854746886Z I0318 13:08:27.854715 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="0ac2733a5c456e569dff8b5ec7174b18217967fddb502e304fd04b5a9e769b63") 2026-03-18T13:08:27.855037164Z E0318 13:08:27.854990 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-18T13:08:27.855117766Z E0318 13:08:27.855091 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-18T13:08:27.855130086Z I0318 13:08:27.855115 1 leaderelection.go:297] failed to renew lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: timed out waiting for the condition 2026-03-18T13:08:27.855624059Z I0318 13:08:27.855580 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-18T13:08:27.855643169Z I0318 13:08:27.855629 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-03-18T13:08:27.855652960Z I0318 13:08:27.855636 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-18T13:08:27.855662460Z I0318 13:08:27.855640 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-03-18T13:08:27.855723382Z I0318 13:08:27.855689 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-18T13:08:27.858831543Z E0318 13:08:27.858759 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:08:27.858855143Z I0318 13:08:27.855715 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-03-18T13:08:27.858855143Z I0318 13:08:27.858837 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:08:27.858855143Z I0318 13:08:27.855774 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-18T13:08:27.858874734Z I0318 13:08:27.855772 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-03-18T13:08:27.858874734Z I0318 13:08:27.855791 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-03-18T13:08:27.858874734Z I0318 13:08:27.855926 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-18T13:08:27.858874734Z I0318 13:08:27.855970 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-18T13:08:27.858885874Z I0318 13:08:27.855968 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-18T13:08:27.858885874Z I0318 13:08:27.856029 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-03-18T13:08:27.858895794Z I0318 13:08:27.856202 1 base_controller.go:181] Shutting down GuardController ... 2026-03-18T13:08:27.858895794Z I0318 13:08:27.856218 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-03-18T13:08:27.858905445Z I0318 13:08:27.856230 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-03-18T13:08:27.858914715Z I0318 13:08:27.856243 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-18T13:08:27.858914715Z I0318 13:08:27.856490 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-18T13:08:27.858924425Z I0318 13:08:27.856498 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-03-18T13:08:27.858924425Z I0318 13:08:27.856512 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-03-18T13:08:27.858933865Z I0318 13:08:27.858030 1 base_controller.go:181] Shutting down PruneController ... 2026-03-18T13:08:27.858943516Z I0318 13:08:27.858925 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-18T13:08:27.858952806Z I0318 13:08:27.858942 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-03-18T13:08:27.859000137Z I0318 13:08:27.858959 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-03-18T13:08:27.859186362Z I0318 13:08:27.858043 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-18T13:08:27.859186362Z I0318 13:08:27.859038 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-18T13:08:27.859186362Z I0318 13:08:27.859056 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-18T13:08:27.859186362Z I0318 13:08:27.859078 1 controller_manager.go:54] RevisionController controller terminated 2026-03-18T13:08:27.859186362Z I0318 13:08:27.859081 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-03-18T13:08:27.859186362Z I0318 13:08:27.859092 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-03-18T13:08:27.859186362Z I0318 13:08:27.859100 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-03-18T13:08:27.859186362Z I0318 13:08:27.858970 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:08:27.859186362Z I0318 13:08:27.859128 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-18T13:08:27.859186362Z I0318 13:08:27.859139 1 controller_manager.go:54] GuardController controller terminated 2026-03-18T13:08:27.859186362Z I0318 13:08:27.858052 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-03-18T13:08:27.859186362Z I0318 13:08:27.859146 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-4076659696/tls.crt::/tmp/serving-cert-4076659696/tls.key" 2026-03-18T13:08:27.859186362Z I0318 13:08:27.858063 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-18T13:08:27.859186362Z I0318 13:08:27.859169 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-18T13:08:27.859186362Z I0318 13:08:27.858070 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-18T13:08:27.859186362Z I0318 13:08:27.859180 1 controller_manager.go:54] PruneController controller terminated 2026-03-18T13:08:27.859211893Z E0318 13:08:27.858071 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-18T13:08:27.859211893Z I0318 13:08:27.859188 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-18T13:08:27.859211893Z I0318 13:08:27.859205 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-18T13:08:27.859223493Z I0318 13:08:27.858076 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-03-18T13:08:27.859233643Z I0318 13:08:27.859222 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-18T13:08:27.859243983Z I0318 13:08:27.859231 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-03-18T13:08:27.859243983Z I0318 13:08:27.858101 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-18T13:08:27.859243983Z I0318 13:08:27.858110 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-18T13:08:27.859254774Z I0318 13:08:27.859247 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-18T13:08:27.859264754Z I0318 13:08:27.858128 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-18T13:08:27.859264754Z I0318 13:08:27.858263 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-18T13:08:27.859275004Z I0318 13:08:27.859266 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-18T13:08:27.859295195Z I0318 13:08:27.859274 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-18T13:08:27.859295195Z I0318 13:08:27.858309 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-03-18T13:08:27.859295195Z I0318 13:08:27.858343 1 base_controller.go:181] Shutting down Installer ... 2026-03-18T13:08:27.859295195Z I0318 13:08:27.858364 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-18T13:08:27.859311885Z E0318 13:08:27.858440 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-18T13:08:27.859311885Z I0318 13:08:27.859300 1 base_controller.go:113] All Installer workers have been terminated 2026-03-18T13:08:27.859322975Z I0318 13:08:27.859313 1 controller_manager.go:54] Installer controller terminated 2026-03-18T13:08:27.859322975Z I0318 13:08:27.858878 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-18T13:08:27.859335426Z I0318 13:08:27.858913 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-18T13:08:27.859428908Z I0318 13:08:27.859400 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-18T13:08:27.859537231Z I0318 13:08:27.859494 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-18T13:08:27.859537231Z I0318 13:08:27.859529 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-18T13:08:27.859550361Z I0318 13:08:27.859542 1 builder.go:335] server exited 2026-03-18T13:08:27.859958832Z I0318 13:08:27.859919 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-18T13:08:27.859972482Z I0318 13:08:27.859959 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-18T13:08:27.859982502Z I0318 13:08:27.859971 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-18T13:08:27.860368863Z I0318 13:08:27.860337 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-03-18T13:08:27.860368863Z I0318 13:08:27.860363 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-03-18T13:08:27.860382444Z I0318 13:08:27.860368 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-03-18T13:08:27.860382444Z I0318 13:08:27.860372 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-03-18T13:08:27.860392594Z I0318 13:08:27.860381 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-03-18T13:08:27.860402394Z I0318 13:08:27.860392 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-03-18T13:08:27.860734973Z E0318 13:08:27.860686 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler\": context canceled, \"assets/kube-scheduler/leader-election-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/scheduler-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/policyconfigmap-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/policyconfigmap-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:08:27.861915613Z I0318 13:08:27.861875 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-18T13:08:27.861915613Z I0318 13:08:27.861904 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-18T13:08:27.861974035Z E0318 13:08:27.861938 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-18T13:08:27.863191757Z I0318 13:08:27.863152 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-18T13:08:27.863210488Z I0318 13:08:27.863191 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-18T13:08:32.854185128Z I0318 13:08:32.854101 1 observer_polling.go:162] Shutting down file observer 2026-03-18T13:09:01.859632091Z E0318 13:09:01.859517 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-18T13:09:01.859632091Z W0318 13:09:01.859559 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-zm5rd.json0000640000000000000000000001365315156522256032116 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-dddff6458-zm5rd","generateName":"openshift-kube-scheduler-operator-dddff6458-","namespace":"openshift-kube-scheduler-operator","uid":"a8eff549-02f3-446e-b3a1-a66cecdc02a6","resourceVersion":"9421","creationTimestamp":"2026-03-18T13:05:34Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"dddff6458"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-dddff6458","uid":"0e6750fe-b8dd-46df-9856-7a8c9f42a70e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2026-03-18T13:06:52Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-18T13:11:06Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:07:07Z","finishedAt":"2026-03-18T13:09:01Z","containerID":"cri-o://0fa9267fcb1942ed177056f1462768d5db7582291e5f4b758f528a23e47041d8"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","containerID":"cri-o://8282b58a87a9816b39b8e46af1e553cfafda7bc3ace1196ac63b527830a8a86a","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-3-master-0/installer_current.log0000640000000000000000000001513615156522256027176 0ustar00000000000000002026-03-18T13:07:55.447223811Z I0318 13:07:55.447017 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000372500 cert-secrets:0xc000372000 configmaps:0xc0008afae0 namespace:0xc0008af400 optional-configmaps:0xc0008afc20 optional-secrets:0xc0008afb80 pod:0xc0008af540 pod-manifest-dir:0xc0008afd60 resource-dir:0xc0008afcc0 revision:0xc0008af360 secrets:0xc0008af680 v:0xc0004d66e0] [0xc0004d66e0 0xc0008af360 0xc0008af400 0xc0008af540 0xc0008afcc0 0xc0008afd60 0xc0008afae0 0xc0008afc20 0xc0008afb80 0xc0008af680 0xc000372500 0xc000372000] [] map[cert-configmaps:0xc000372140 cert-dir:0xc000372500 cert-secrets:0xc000372000 configmaps:0xc0008afae0 help:0xc0004d6aa0 kubeconfig:0xc0008af2c0 log-flush-frequency:0xc0004d6640 namespace:0xc0008af400 optional-cert-configmaps:0xc0003723c0 optional-cert-secrets:0xc000372280 optional-configmaps:0xc0008afc20 optional-secrets:0xc0008afb80 pod:0xc0008af540 pod-manifest-dir:0xc0008afd60 pod-manifests-lock-file:0xc0008afea0 resource-dir:0xc0008afcc0 revision:0xc0008af360 secrets:0xc0008af680 timeout-duration:0xc0008afe00 v:0xc0004d66e0 vmodule:0xc0004d6780] [0xc0008af2c0 0xc0008af360 0xc0008af400 0xc0008af540 0xc0008af680 0xc0008afae0 0xc0008afb80 0xc0008afc20 0xc0008afcc0 0xc0008afd60 0xc0008afe00 0xc0008afea0 0xc000372000 0xc000372140 0xc000372280 0xc0003723c0 0xc000372500 0xc0004d6640 0xc0004d66e0 0xc0004d6780 0xc0004d6aa0] [0xc000372140 0xc000372500 0xc000372000 0xc0008afae0 0xc0004d6aa0 0xc0008af2c0 0xc0004d6640 0xc0008af400 0xc0003723c0 0xc000372280 0xc0008afc20 0xc0008afb80 0xc0008af540 0xc0008afd60 0xc0008afea0 0xc0008afcc0 0xc0008af360 0xc0008af680 0xc0008afe00 0xc0004d66e0 0xc0004d6780] map[104:0xc0004d6aa0 118:0xc0004d66e0] [] -1 0 0xc000b96720 true 0x223dac0 []} 2026-03-18T13:07:55.447348454Z I0318 13:07:55.447225 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000aec4e0)({ 2026-03-18T13:07:55.447348454Z KubeConfig: (string) "", 2026-03-18T13:07:55.447348454Z KubeClient: (kubernetes.Interface) , 2026-03-18T13:07:55.447348454Z Revision: (string) (len=1) "3", 2026-03-18T13:07:55.447348454Z NodeName: (string) "", 2026-03-18T13:07:55.447348454Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-18T13:07:55.447348454Z Clock: (clock.RealClock) { 2026-03-18T13:07:55.447348454Z }, 2026-03-18T13:07:55.447348454Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-18T13:07:55.447348454Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T13:07:55.447348454Z (string) (len=31) "localhost-recovery-client-token" 2026-03-18T13:07:55.447348454Z }, 2026-03-18T13:07:55.447348454Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T13:07:55.447348454Z (string) (len=12) "serving-cert" 2026-03-18T13:07:55.447348454Z }, 2026-03-18T13:07:55.447348454Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-18T13:07:55.447348454Z (string) (len=18) "kube-scheduler-pod", 2026-03-18T13:07:55.447348454Z (string) (len=6) "config", 2026-03-18T13:07:55.447348454Z (string) (len=17) "serviceaccount-ca", 2026-03-18T13:07:55.447348454Z (string) (len=20) "scheduler-kubeconfig", 2026-03-18T13:07:55.447348454Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-18T13:07:55.447348454Z }, 2026-03-18T13:07:55.447348454Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T13:07:55.447348454Z (string) (len=16) "policy-configmap" 2026-03-18T13:07:55.447348454Z }, 2026-03-18T13:07:55.447348454Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-18T13:07:55.447348454Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-18T13:07:55.447348454Z }, 2026-03-18T13:07:55.447348454Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-18T13:07:55.447348454Z CertConfigMapNamePrefixes: ([]string) , 2026-03-18T13:07:55.447348454Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-18T13:07:55.447348454Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-18T13:07:55.447348454Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T13:07:55.447348454Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T13:07:55.447348454Z Timeout: (time.Duration) 2m0s, 2026-03-18T13:07:55.447348454Z StaticPodManifestsLockFile: (string) "", 2026-03-18T13:07:55.447348454Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T13:07:55.447348454Z KubeletVersion: (string) "" 2026-03-18T13:07:55.447348454Z }) 2026-03-18T13:07:55.450213866Z I0318 13:07:55.450157 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T13:07:55.458735098Z I0318 13:07:55.458676 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T13:07:55.458762739Z I0318 13:07:55.458732 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T13:07:55.458762739Z I0318 13:07:55.458745 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T13:07:55.462927024Z I0318 13:07:55.461000 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-18T13:08:07.815461728Z I0318 13:08:07.814301 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-18T13:08:29.464337818Z W0318 13:08:29.464208 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:08:49.462051378Z W0318 13:08:49.461951 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:09:09.462748375Z W0318 13:09:09.462649 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:09:23.465474517Z W0318 13:09:23.465317 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:09:23.465474517Z F0318 13:09:23.465373 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-scheduler/installer-3-master-0.json0000640000000000000000000001632515156522256022664 0ustar0000000000000000{"metadata":{"name":"installer-3-master-0","namespace":"openshift-kube-scheduler","uid":"615539dc-56e1-4489-9aee-33b3e769d4fc","resourceVersion":"9427","creationTimestamp":"2026-03-18T13:07:53Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.55/23\"],\"mac_address\":\"0a:58:0a:80:00:37\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.55/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.55\"\n ],\n \"mac\": \"0a:58:0a:80:00:37\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-3","uid":"d8265563-66af-4b31-9228-f25f83f6ca5a"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=3","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:53Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:06Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:06Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.55","podIPs":[{"ip":"10.128.0.55"}],"startTime":"2026-03-18T13:07:53Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0318 13:07:55.450157 1 cmd.go:413] Getting controller reference for node master-0\nI0318 13:07:55.458676 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0318 13:07:55.458732 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0318 13:07:55.458745 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0318 13:07:55.461000 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0318 13:08:07.814301 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0318 13:08:29.464208 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0318 13:08:49.461951 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0318 13:09:09.462649 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0318 13:09:23.465317 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0318 13:09:23.465373 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-03-18T13:07:54Z","finishedAt":"2026-03-18T13:09:23Z","containerID":"cri-o://60014c22022db848874d3a05474beca08d37dd24a5fad732534f373108a2dd40"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","containerID":"cri-o://60014c22022db848874d3a05474beca08d37dd24a5fad732534f373108a2dd40","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000004230515156522256030232 0ustar00000000000000002026-03-18T13:09:26.245024939Z weight: 0 2026-03-18T13:09:26.245024939Z - name: NodeResourcesFit 2026-03-18T13:09:26.245024939Z weight: 1 2026-03-18T13:09:26.245024939Z - name: VolumeRestrictions 2026-03-18T13:09:26.245024939Z weight: 0 2026-03-18T13:09:26.245024939Z - name: NodeVolumeLimits 2026-03-18T13:09:26.245024939Z weight: 0 2026-03-18T13:09:26.245024939Z - name: VolumeBinding 2026-03-18T13:09:26.245024939Z weight: 0 2026-03-18T13:09:26.245024939Z - name: VolumeZone 2026-03-18T13:09:26.245024939Z weight: 0 2026-03-18T13:09:26.245024939Z - name: PodTopologySpread 2026-03-18T13:09:26.245024939Z weight: 2 2026-03-18T13:09:26.245024939Z - name: InterPodAffinity 2026-03-18T13:09:26.245024939Z weight: 2 2026-03-18T13:09:26.245024939Z - name: DefaultPreemption 2026-03-18T13:09:26.245024939Z weight: 0 2026-03-18T13:09:26.245024939Z - name: NodeResourcesBalancedAllocation 2026-03-18T13:09:26.245024939Z weight: 1 2026-03-18T13:09:26.245024939Z - name: ImageLocality 2026-03-18T13:09:26.245024939Z weight: 1 2026-03-18T13:09:26.245024939Z - name: DefaultBinder 2026-03-18T13:09:26.245024939Z weight: 0 2026-03-18T13:09:26.245024939Z permit: {} 2026-03-18T13:09:26.245024939Z postBind: {} 2026-03-18T13:09:26.245024939Z postFilter: {} 2026-03-18T13:09:26.245024939Z preBind: {} 2026-03-18T13:09:26.245024939Z preEnqueue: {} 2026-03-18T13:09:26.245024939Z preFilter: {} 2026-03-18T13:09:26.245024939Z preScore: {} 2026-03-18T13:09:26.245024939Z queueSort: {} 2026-03-18T13:09:26.245024939Z reserve: {} 2026-03-18T13:09:26.245024939Z score: {} 2026-03-18T13:09:26.245024939Z schedulerName: default-scheduler 2026-03-18T13:09:26.245024939Z > 2026-03-18T13:09:26.247671578Z I0318 13:09:26.247542 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-18T13:09:26.247671578Z I0318 13:09:26.247585 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-18T13:09:26.254594509Z I0318 13:09:26.254198 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:09:26.254594509Z I0318 13:09:26.254305 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:09:26.254652210Z I0318 13:09:26.254611 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773839305\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773839305\" (2026-03-18 12:08:25 +0000 UTC to 2027-03-18 12:08:25 +0000 UTC (now=2026-03-18 13:09:26.254580159 +0000 UTC))" 2026-03-18T13:09:26.254716152Z I0318 13:09:26.254660 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-18T13:09:26.254881437Z I0318 13:09:26.254789 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839306\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839305\" (2026-03-18 12:08:25 +0000 UTC to 2029-03-18 12:08:25 +0000 UTC (now=2026-03-18 13:09:26.254767363 +0000 UTC))" 2026-03-18T13:09:26.254903288Z I0318 13:09:26.254879 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-18T13:09:26.255007641Z I0318 13:09:26.254957 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:09:26.261564012Z I0318 13:09:26.259056 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.261564012Z I0318 13:09:26.259103 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.261564012Z I0318 13:09:26.259304 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.261564012Z I0318 13:09:26.259052 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.261564012Z I0318 13:09:26.259464 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.261564012Z I0318 13:09:26.259064 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-18T13:09:26.261564012Z I0318 13:09:26.260048 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.261564012Z I0318 13:09:26.260122 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.261564012Z I0318 13:09:26.260322 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.261564012Z I0318 13:09:26.260353 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-18T13:09:26.261564012Z I0318 13:09:26.261182 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.261675815Z I0318 13:09:26.261635 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.261896890Z I0318 13:09:26.261857 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.272469397Z I0318 13:09:26.272366 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.274577673Z I0318 13:09:26.274490 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.277799387Z I0318 13:09:26.277760 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.285875338Z I0318 13:09:26.285794 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:09:26.355304004Z I0318 13:09:26.355222 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:09:26.355662963Z I0318 13:09:26.355605 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-18T13:09:26.356101226Z I0318 13:09:26.355958 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:50:06 +0000 UTC to 2036-03-15 12:50:06 +0000 UTC (now=2026-03-18 13:09:26.355915751 +0000 UTC))" 2026-03-18T13:09:26.356101226Z I0318 13:09:26.356030 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2026-03-19 12:57:20 +0000 UTC (now=2026-03-18 13:09:26.356018043 +0000 UTC))" 2026-03-18T13:09:26.356101226Z I0318 13:09:26.356064 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2027-03-18 12:57:20 +0000 UTC (now=2026-03-18 13:09:26.356053194 +0000 UTC))" 2026-03-18T13:09:26.356131506Z I0318 13:09:26.356095 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2027-03-18 12:57:20 +0000 UTC (now=2026-03-18 13:09:26.356081885 +0000 UTC))" 2026-03-18T13:09:26.356151507Z I0318 13:09:26.356128 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:57:18 +0000 UTC to 2036-03-15 12:57:18 +0000 UTC (now=2026-03-18 13:09:26.356115916 +0000 UTC))" 2026-03-18T13:09:26.356590128Z I0318 13:09:26.356525 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773839305\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773839305\" (2026-03-18 12:08:25 +0000 UTC to 2027-03-18 12:08:25 +0000 UTC (now=2026-03-18 13:09:26.356502376 +0000 UTC))" 2026-03-18T13:09:26.358559120Z I0318 13:09:26.356797 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839306\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839305\" (2026-03-18 12:08:25 +0000 UTC to 2029-03-18 12:08:25 +0000 UTC (now=2026-03-18 13:09:26.356780793 +0000 UTC))" 2026-03-18T13:09:31.357840431Z E0318 13:09:31.357699 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:09:39.645803132Z E0318 13:09:39.645451 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:09:48.552583487Z E0318 13:09:48.552391 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:09:57.830508261Z E0318 13:09:57.830382 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:10:05.443526606Z E0318 13:10:05.443213 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:10:12.838447014Z E0318 13:10:12.838228 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:10:20.064335290Z E0318 13:10:20.064228 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:10:29.186582973Z E0318 13:10:29.186483 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:10:36.292470724Z E0318 13:10:36.292344 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:10:45.264479022Z E0318 13:10:45.264337 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:10:52.649009151Z E0318 13:10:52.648919 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:11:13.735595795Z I0318 13:11:13.735500 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-18T13:11:26.994121904Z I0318 13:11:26.993589 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-5vhnr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:27.092074870Z I0318 13:11:27.091336 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77-59d95" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:27.844164629Z I0318 13:11:27.843403 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-6c8df6d4b-7tcjk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:34.071898341Z I0318 13:11:34.071853 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-6cb57bb5db-tc2gl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:34.492081825Z I0318 13:11:34.492025 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78-sqx7p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:35.204435310Z I0318 13:11:35.204357 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/openshift-state-metrics-5dc6c74576-s4ql7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:35.205691192Z I0318 13:11:35.205084 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/node-exporter-t4p42" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:35.226464315Z I0318 13:11:35.226380 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/kube-state-metrics-7bbc969446-mxcng" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:36.145362465Z I0318 13:11:36.145286 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-866dc4744-lqtbg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:36.898353678Z I0318 13:11:36.898078 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-68bf6ff9d6-bbqfl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:37.128833710Z I0318 13:11:37.128603 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-6fbb6cf6f9-9bqxm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:37.502697121Z I0318 13:11:37.502378 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c-wr89x" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:40.822712815Z I0318 13:11:40.822636 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/metrics-server-65dbcd767c-7bqc9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:48.250289662Z I0318 13:11:48.250186 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-8wqfk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:48.377741366Z I0318 13:11:48.377428 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-tqw5h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:49.778320262Z I0318 13:11:49.778079 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-bxlrz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:50.977350119Z I0318 13:11:50.977257 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-89st2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:51.538012115Z I0318 13:11:51.537932 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-5c6485487f-fk8ql" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006552115156522256030431 0ustar00000000000000002026-03-18T13:05:34.630864154Z I0318 13:05:34.630748 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-66b84d69b-wqxpk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:34.730131159Z I0318 13:05:34.730028 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-t84s9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:34.836737508Z I0318 13:05:34.836671 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-7bd846bfc4-gxxbr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:05:34.929230451Z I0318 13:05:34.928152 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-89ccd998f-99pzm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:35.028124297Z I0318 13:05:35.028070 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-n7fn4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:35.132496452Z I0318 13:05:35.132395 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-p7vvx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:35.226908682Z I0318 13:05:35.226459 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-b865698dc-hnr6m" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:35.330432458Z I0318 13:05:35.330129 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-machine-config-operator/machine-config-operator-84d549f6d5-dlr6p" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:35.428910084Z I0318 13:05:35.428815 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/olm-operator-5c9796789-z8jkt" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:35.528393734Z I0318 13:05:35.528074 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-58845fbb57-n8hgl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:35.629072632Z I0318 13:05:35.629014 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-598fbc5f8f-kvbzn" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:35.730496228Z I0318 13:05:35.730386 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-sp4ld" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:35.827081108Z I0318 13:05:35.826983 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-bppd4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:35.929080438Z I0318 13:05:35.928284 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-4bqf9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:36.030723219Z I0318 13:05:36.030332 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-qwgrm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:05:36.906054383Z I0318 13:05:36.905964 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-7bfhd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:05:49.360633280Z I0318 13:05:49.359966 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-pr494" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:05:59.245209917Z I0318 13:05:59.244469 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-vkbvp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:05:59.424090910Z I0318 13:05:59.423694 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-ttdn5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:00.224681791Z I0318 13:06:00.223599 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-kbfbq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:02.212486722Z I0318 13:06:02.212437 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-zrc8h" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:11.621340021Z I0318 13:06:11.621235 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-57f769d897-hvnt4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:11.833086434Z I0318 13:06:11.833026 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-vz82q" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:13.826982194Z I0318 13:06:13.826908 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-tw7c7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:14.818971725Z I0318 13:06:14.818911 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-kcsgp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:21.003614469Z I0318 13:06:21.003511 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-x8r78" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:41.772630117Z I0318 13:06:41.772295 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-kxqjc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.410037067Z I0318 13:06:52.409910 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-cpqm5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.416344637Z I0318 13:06:52.416156 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-6bb5bfb6fd-b6szb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.416344637Z I0318 13:06:52.416291 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6-r4dzk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.416854289Z I0318 13:06:52.416346 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-6f69995874-mz4qp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.416854289Z I0318 13:06:52.416380 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-5549dc66cb-6l7pv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.416854289Z I0318 13:06:52.416467 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5f5d689c6b-68lgz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.416854289Z I0318 13:06:52.416521 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-9c5679d8f-5lzzn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.416854289Z I0318 13:06:52.416637 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-66b84d69b-wqxpk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.421289725Z I0318 13:06:52.421017 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-8544cbcf9c-jx4mf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.432925182Z I0318 13:06:52.432819 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-qwgrm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.434333167Z I0318 13:06:52.434283 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-k8tv4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.434450569Z I0318 13:06:52.434395 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-84d549f6d5-dlr6p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.434587252Z I0318 13:06:52.434546 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-t84s9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.434602153Z I0318 13:06:52.434592 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-5c9796789-z8jkt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.434643534Z I0318 13:06:52.434623 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-598fbc5f8f-kvbzn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.434680205Z I0318 13:06:52.434661 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-sp4ld" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.434715555Z I0318 13:06:52.434696 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-4bqf9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.434752626Z I0318 13:06:52.434733 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-zrc8h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.434870579Z I0318 13:06:52.434844 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-p7vvx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.434968451Z I0318 13:06:52.434943 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-b865698dc-hnr6m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.435026253Z I0318 13:06:52.435002 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-58845fbb57-n8hgl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.435056323Z I0318 13:06:52.435040 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-zm5rd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.435093184Z I0318 13:06:52.435077 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-89ccd998f-99pzm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.435130115Z I0318 13:06:52.435113 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-n7fn4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.435182916Z I0318 13:06:52.435161 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-bppd4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:52.475108837Z I0318 13:06:52.475026 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-jkl4x" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:08.430613726Z I0318 13:07:08.429741 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-64854d9cff-qsnxz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:08.530470555Z I0318 13:07:08.528297 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-8487694857-49h6x" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:09.590530268Z I0318 13:07:09.589476 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-f5df8899c-4vt5h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:10.144376443Z I0318 13:07:10.142894 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-688d854df6-pbq74" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:10.150776105Z I0318 13:07:10.150227 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-59dbf97cf8-p7zns" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:07:10.517177814Z I0318 13:07:10.516630 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-79bc6b8d76-2zvf2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:11.632061543Z I0318 13:07:11.631709 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-59dbf97cf8-p7zns" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:11.738770155Z I0318 13:07:11.738185 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7fdd9495d7-jnhck" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:07:13.776673690Z I0318 13:07:13.774262 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-7fdd9495d7-jnhck" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:13.871703205Z I0318 13:07:13.870735 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-65c549646c-d9988" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:07:13.914488364Z I0318 13:07:13.914293 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-c8db4484-th8hr" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:07:15.774586668Z I0318 13:07:15.773873 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-65c549646c-d9988" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:07:15.779939202Z I0318 13:07:15.779592 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-c8db4484-th8hr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:17.970705801Z I0318 13:07:17.970639 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-65c549646c-d9988" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:20.409636333Z I0318 13:07:20.407576 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-85f4f795dd-9l6gz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:22.761449836Z I0318 13:07:22.761208 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-5ftdj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:24.246329822Z I0318 13:07:24.244990 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-85b59d8688-wd26k" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:07:25.937476222Z I0318 13:07:25.937387 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-85b59d8688-wd26k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:35.607330289Z I0318 13:07:35.599074 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-6864dc98f7-q2ndb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:35.607330289Z I0318 13:07:35.599230 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-57777556ff-9bjsj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:35.645935365Z I0318 13:07:35.645870 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-5bb6f9f846-6wq9c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:35.824459177Z I0318 13:07:35.824317 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-56d4dd5dfc-8qqm4" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:07:35.868061206Z I0318 13:07:35.867224 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-774f95d4b8-2gwjr" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:07:36.978598655Z I0318 13:07:36.978521 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-92s8c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:36.991753283Z I0318 13:07:36.988301 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-56d4dd5dfc-8qqm4" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:07:37.008908712Z I0318 13:07:37.008398 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-774f95d4b8-2gwjr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:37.311680650Z I0318 13:07:37.311035 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7dcf5569b5-gvmtv" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:07:37.498277934Z I0318 13:07:37.498215 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-7vddk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:38.993477407Z I0318 13:07:38.990555 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-56d4dd5dfc-8qqm4" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:07:42.084751663Z I0318 13:07:42.082743 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-5blrl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.782291510Z I0318 13:07:48.778718 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-wsmsc" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:07:49.072695969Z I0318 13:07:49.072431 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-fffb75699-b7pwr" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:07:49.097294533Z I0318 13:07:49.092703 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-56d4dd5dfc-8qqm4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:49.177042047Z I0318 13:07:49.176980 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-c8888769b-8mxp6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:50.489093321Z I0318 13:07:50.486148 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-fffb75699-b7pwr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:51.337753284Z I0318 13:07:51.337666 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-b4f87c5b9-9fdnt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:54.904731992Z I0318 13:07:54.904315 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-7dcf5569b5-gvmtv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:54.918471164Z I0318 13:07:54.909605 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-tw7c7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:54.918471164Z I0318 13:07:54.909993 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-wsmsc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:54.983682485Z I0318 13:07:54.983596 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-7d58488df-bqmqw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:58.463635337Z I0318 13:07:58.462521 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-ff75f747c-r46tm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:00.528046077Z I0318 13:08:00.527980 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-wxht4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:14.795235118Z E0318 13:08:14.795110 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-03-18T13:08:19.794631576Z E0318 13:08:19.794516 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-18T13:08:19.794631576Z I0318 13:08:19.794570 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-18T13:08:24.796063551Z E0318 13:08:24.795957 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:08:24.796147833Z E0318 13:08:24.796087 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515156522256023015 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"8d122ae0-181c-4ce9-94a9-faf8aafde05d","resourceVersion":"9364","creationTimestamp":"2026-03-18T13:06:11Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.mirror":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.seen":"2026-03-18T13:04:59.659917841Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c638b1e6-897b-4df5-a4b7-de9264d6b4f8","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:05Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:05Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:26Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:26Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:05Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T13:07:05Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-18T13:08:25Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-18T13:05:09Z","finishedAt":"2026-03-18T13:08:24Z","containerID":"cri-o://fa24e07dc1e554926055d55fec3f68de49cdd19d5efe278d06ec7ad571b7e767"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","containerID":"cri-o://2b457975b25ebc40cb55c5ee5a932669f56be2bc949f61f598bc7d15209f09c7","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415156522256044251 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-n7fn42026-03-18T13:11:07.175083861Z I0318 13:11:07.173811 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:11:07.175083861Z I0318 13:11:07.173945 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:11:07.175245465Z I0318 13:11:07.175101 1 observer_polling.go:159] Starting file observer 2026-03-18T13:11:08.467019104Z I0318 13:11:08.466724 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-18T13:11:08.800905046Z I0318 13:11:08.800282 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:11:08.800982059Z W0318 13:11:08.800968 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:08.801004799Z W0318 13:11:08.800996 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:08.801025700Z W0318 13:11:08.801017 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:11:08.801045620Z W0318 13:11:08.801037 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:11:08.801066091Z W0318 13:11:08.801058 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:11:08.801085592Z W0318 13:11:08.801077 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:11:08.808563678Z I0318 13:11:08.808516 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:11:08.808642780Z I0318 13:11:08.808619 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:11:08.808652360Z I0318 13:11:08.808647 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:11:08.808703142Z I0318 13:11:08.808679 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:11:08.808839836Z I0318 13:11:08.808817 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:11:08.808977220Z I0318 13:11:08.808936 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:11:08.808977220Z I0318 13:11:08.808948 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:08.808977220Z I0318 13:11:08.808962 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:11:08.808977220Z I0318 13:11:08.808973 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:08.909466919Z I0318 13:11:08.909369 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:08.909513110Z I0318 13:11:08.909478 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:08.909556691Z I0318 13:11:08.909529 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:11:09.294059054Z I0318 13:11:09.293935 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:11:09.294658881Z I0318 13:11:09.294615 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... kube-controller-manager-operator_previous.log0000640000000000000000000000247115156522256044452 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-n7fn42026-03-18T13:09:13.700406238Z I0318 13:09:13.700195 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:09:13.700609493Z I0318 13:09:13.700380 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:09:13.701023904Z I0318 13:09:13.700981 1 observer_polling.go:159] Starting file observer 2026-03-18T13:10:13.710708976Z W0318 13:10:13.710581 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-operator-ff989d6cc-n7fn4) 2026-03-18T13:10:13.710794168Z I0318 13:10:13.710751 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-18T13:10:44.142173204Z F0318 13:10:44.142058 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock": context deadline exceeded kube-controller-manager-operator-ff989d6cc-n7fn4.json0000640000000000000000000001672615156522256033402 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-ff989d6cc-n7fn4","generateName":"kube-controller-manager-operator-ff989d6cc-","namespace":"openshift-kube-controller-manager-operator","uid":"b75d4622-ac12-4f82-afc9-ab63e6278b0c","resourceVersion":"9426","creationTimestamp":"2026-03-18T13:05:35Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"ff989d6cc"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.26/23\"],\"mac_address\":\"0a:58:0a:80:00:1a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.26/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.26\"\n ],\n \"mac\": \"0a:58:0a:80:00:1a\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-ff989d6cc","uid":"915e2042-706f-41d8-9a65-20e23626c9f6","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67c988e079558dc6b20232ebf9a7f7276fee60c756caed584c9715e0bec77a5a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.26","podIPs":[{"ip":"10.128.0.26"}],"startTime":"2026-03-18T13:06:52Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-18T13:11:07Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0318 13:09:13.700195 1 cmd.go:253] Using service-serving-cert provided certificates\nI0318 13:09:13.700380 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 13:09:13.700981 1 observer_polling.go:159] Starting file observer\nW0318 13:10:13.710581 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-operator-ff989d6cc-n7fn4)\nI0318 13:10:13.710751 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0\nF0318 13:10:44.142058 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-18T13:09:13Z","finishedAt":"2026-03-18T13:10:44Z","containerID":"cri-o://8fd581d9433e603018eead43b8e27a33c255b946ee133532ab11a25007d5ddfb"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","containerID":"cri-o://efe6e287c36852699c4eb20fb17353458d83a029dc0001b97b2d103045cc17c2","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000011412515156522256031010 0ustar00000000000000002026-03-18T13:11:24.642803867Z (string) (len=10) "csr-signer" 2026-03-18T13:11:24.642803867Z }, 2026-03-18T13:11:24.642803867Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-18T13:11:24.642803867Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-18T13:11:24.642803867Z (string) (len=20) "aggregator-client-ca", 2026-03-18T13:11:24.642803867Z (string) (len=9) "client-ca" 2026-03-18T13:11:24.642803867Z }, 2026-03-18T13:11:24.642803867Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T13:11:24.642803867Z (string) (len=17) "trusted-ca-bundle" 2026-03-18T13:11:24.642803867Z }, 2026-03-18T13:11:24.642803867Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-18T13:11:24.642803867Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T13:11:24.642803867Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T13:11:24.642803867Z Timeout: (time.Duration) 2m0s, 2026-03-18T13:11:24.642803867Z StaticPodManifestsLockFile: (string) "", 2026-03-18T13:11:24.642803867Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T13:11:24.642803867Z KubeletVersion: (string) "" 2026-03-18T13:11:24.642803867Z }) 2026-03-18T13:11:24.643843706Z I0318 13:11:24.643798 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T13:11:24.656694418Z I0318 13:11:24.656611 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T13:11:24.656747059Z I0318 13:11:24.656695 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T13:11:24.656747059Z I0318 13:11:24.656715 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T13:11:24.660363033Z I0318 13:11:24.660296 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-18T13:11:54.661106450Z I0318 13:11:54.661058 1 cmd.go:524] Getting installer pods for node master-0 2026-03-18T13:11:54.663743637Z I0318 13:11:54.663706 1 cmd.go:542] Latest installer revision for node master-0 is: 2 2026-03-18T13:11:54.663790748Z I0318 13:11:54.663780 1 cmd.go:431] Querying kubelet version for node master-0 2026-03-18T13:11:54.676522908Z I0318 13:11:54.676432 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-03-18T13:11:54.676522908Z I0318 13:11:54.676477 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-18T13:11:54.676647612Z I0318 13:11:54.676616 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-18T13:11:54.676647612Z I0318 13:11:54.676633 1 cmd.go:229] Getting secrets ... 2026-03-18T13:11:54.679046521Z I0318 13:11:54.679023 1 copy.go:32] Got secret openshift-kube-controller-manager/localhost-recovery-client-token-2 2026-03-18T13:11:54.680598771Z I0318 13:11:54.680567 1 copy.go:32] Got secret openshift-kube-controller-manager/service-account-private-key-2 2026-03-18T13:11:54.681861443Z I0318 13:11:54.681830 1 copy.go:32] Got secret openshift-kube-controller-manager/serving-cert-2 2026-03-18T13:11:54.681889514Z I0318 13:11:54.681866 1 cmd.go:242] Getting config maps ... 2026-03-18T13:11:54.683934092Z I0318 13:11:54.683907 1 copy.go:60] Got configMap openshift-kube-controller-manager/cluster-policy-controller-config-2 2026-03-18T13:11:54.685721000Z I0318 13:11:54.685687 1 copy.go:60] Got configMap openshift-kube-controller-manager/config-2 2026-03-18T13:11:54.688505711Z I0318 13:11:54.688470 1 copy.go:60] Got configMap openshift-kube-controller-manager/controller-manager-kubeconfig-2 2026-03-18T13:11:54.690311561Z I0318 13:11:54.690070 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-cert-syncer-kubeconfig-2 2026-03-18T13:11:54.739508199Z I0318 13:11:54.739451 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-manager-pod-2 2026-03-18T13:11:54.864392558Z I0318 13:11:54.864337 1 copy.go:60] Got configMap openshift-kube-controller-manager/recycler-config-2 2026-03-18T13:11:55.064184511Z I0318 13:11:55.064134 1 copy.go:60] Got configMap openshift-kube-controller-manager/service-ca-2 2026-03-18T13:11:55.266245228Z I0318 13:11:55.266150 1 copy.go:60] Got configMap openshift-kube-controller-manager/serviceaccount-ca-2 2026-03-18T13:11:55.464915954Z I0318 13:11:55.464841 1 copy.go:52] Failed to get config map openshift-kube-controller-manager/cloud-config-2: configmaps "cloud-config-2" not found 2026-03-18T13:11:55.464915954Z I0318 13:11:55.464891 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token" ... 2026-03-18T13:11:55.465162682Z I0318 13:11:55.465127 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/namespace" ... 2026-03-18T13:11:55.465373220Z I0318 13:11:55.465343 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/token" ... 2026-03-18T13:11:55.465478844Z I0318 13:11:55.465458 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/ca.crt" ... 2026-03-18T13:11:55.465572387Z I0318 13:11:55.465548 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key" ... 2026-03-18T13:11:55.465633359Z I0318 13:11:55.465612 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key/service-account.key" ... 2026-03-18T13:11:55.465735112Z I0318 13:11:55.465715 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert" ... 2026-03-18T13:11:55.465820255Z I0318 13:11:55.465802 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.crt" ... 2026-03-18T13:11:55.465937369Z I0318 13:11:55.465917 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.key" ... 2026-03-18T13:11:55.466022941Z I0318 13:11:55.466004 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config" ... 2026-03-18T13:11:55.466118664Z I0318 13:11:55.466100 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config/config.yaml" ... 2026-03-18T13:11:55.466207307Z I0318 13:11:55.466188 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config" ... 2026-03-18T13:11:55.466264999Z I0318 13:11:55.466244 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config/config.yaml" ... 2026-03-18T13:11:55.466356122Z I0318 13:11:55.466334 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig" ... 2026-03-18T13:11:55.466420764Z I0318 13:11:55.466390 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig/kubeconfig" ... 2026-03-18T13:11:55.466557349Z I0318 13:11:55.466529 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig" ... 2026-03-18T13:11:55.466620431Z I0318 13:11:55.466600 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig" ... 2026-03-18T13:11:55.466709844Z I0318 13:11:55.466686 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod" ... 2026-03-18T13:11:55.466805697Z I0318 13:11:55.466782 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/pod.yaml" ... 2026-03-18T13:11:55.466902990Z I0318 13:11:55.466880 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/version" ... 2026-03-18T13:11:55.466997773Z I0318 13:11:55.466975 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/forceRedeploymentReason" ... 2026-03-18T13:11:55.467069595Z I0318 13:11:55.467049 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config" ... 2026-03-18T13:11:55.467202670Z I0318 13:11:55.467181 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config/recycler-pod.yaml" ... 2026-03-18T13:11:55.467358475Z I0318 13:11:55.467314 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca" ... 2026-03-18T13:11:55.467400766Z I0318 13:11:55.467379 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca/ca-bundle.crt" ... 2026-03-18T13:11:55.467548721Z I0318 13:11:55.467527 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca" ... 2026-03-18T13:11:55.467656244Z I0318 13:11:55.467632 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-03-18T13:11:55.467746797Z I0318 13:11:55.467726 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs" ... 2026-03-18T13:11:55.467805409Z I0318 13:11:55.467786 1 cmd.go:229] Getting secrets ... 2026-03-18T13:11:55.665920127Z I0318 13:11:55.665848 1 copy.go:32] Got secret openshift-kube-controller-manager/csr-signer 2026-03-18T13:11:55.871636886Z I0318 13:11:55.869929 1 copy.go:32] Got secret openshift-kube-controller-manager/kube-controller-manager-client-cert-key 2026-03-18T13:11:55.871636886Z I0318 13:11:55.869995 1 cmd.go:242] Getting config maps ... 2026-03-18T13:11:56.064029914Z I0318 13:11:56.063949 1 copy.go:60] Got configMap openshift-kube-controller-manager/aggregator-client-ca 2026-03-18T13:11:56.264028015Z I0318 13:11:56.263646 1 copy.go:60] Got configMap openshift-kube-controller-manager/client-ca 2026-03-18T13:11:56.471230332Z I0318 13:11:56.471158 1 copy.go:60] Got configMap openshift-kube-controller-manager/trusted-ca-bundle 2026-03-18T13:11:56.471590963Z I0318 13:11:56.471528 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer" ... 2026-03-18T13:11:56.471777579Z I0318 13:11:56.471752 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.key" ... 2026-03-18T13:11:56.471926494Z I0318 13:11:56.471896 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.crt" ... 2026-03-18T13:11:56.472044398Z I0318 13:11:56.472019 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key" ... 2026-03-18T13:11:56.472119180Z I0318 13:11:56.472095 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.crt" ... 2026-03-18T13:11:56.472230554Z I0318 13:11:56.472204 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.key" ... 2026-03-18T13:11:56.472325577Z I0318 13:11:56.472304 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca" ... 2026-03-18T13:11:56.472607366Z I0318 13:11:56.472577 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca/ca-bundle.crt" ... 2026-03-18T13:11:56.539172866Z I0318 13:11:56.473589 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca" ... 2026-03-18T13:11:56.539172866Z I0318 13:11:56.473664 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca/ca-bundle.crt" ... 2026-03-18T13:11:56.539172866Z I0318 13:11:56.473777 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle" ... 2026-03-18T13:11:56.539172866Z I0318 13:11:56.473895 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle/ca-bundle.crt" ... 2026-03-18T13:11:56.539172866Z I0318 13:11:56.474859 1 cmd.go:335] Getting pod configmaps/kube-controller-manager-pod-2 -n openshift-kube-controller-manager 2026-03-18T13:11:56.663913620Z I0318 13:11:56.663867 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-03-18T13:11:56.664039384Z I0318 13:11:56.664010 1 cmd.go:379] Writing a pod under "kube-controller-manager-pod.yaml" key 2026-03-18T13:11:56.664039384Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-gcsm8 --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-18T13:11:56.667573731Z I0318 13:11:56.667553 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/kube-controller-manager-pod.yaml" ... 2026-03-18T13:11:56.667804428Z I0318 13:11:56.667790 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-18T13:11:56.667924792Z I0318 13:11:56.667843 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-18T13:11:56.667924792Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-gcsm8 --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715156522256027214 0ustar00000000000000002026-03-18T13:07:49.557387884Z I0318 13:07:49.557183 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc00027e640 cert-dir:0xc00027e820 cert-secrets:0xc00027e5a0 configmaps:0xc00027e000 namespace:0xc000a81d60 optional-cert-configmaps:0xc00027e780 optional-cert-secrets:0xc00027e6e0 optional-configmaps:0xc00027e140 optional-secrets:0xc00027e0a0 pod:0xc000a81e00 pod-manifest-dir:0xc00027e280 resource-dir:0xc00027e1e0 revision:0xc000a81cc0 secrets:0xc000a81ea0 v:0xc00027fcc0] [0xc00027fcc0 0xc000a81cc0 0xc000a81d60 0xc000a81e00 0xc00027e1e0 0xc00027e280 0xc00027e000 0xc00027e140 0xc000a81ea0 0xc00027e0a0 0xc00027e820 0xc00027e640 0xc00027e780 0xc00027e5a0 0xc00027e6e0] [] map[cert-configmaps:0xc00027e640 cert-dir:0xc00027e820 cert-secrets:0xc00027e5a0 configmaps:0xc00027e000 help:0xc00044e3c0 kubeconfig:0xc000a81c20 log-flush-frequency:0xc00027fc20 namespace:0xc000a81d60 optional-cert-configmaps:0xc00027e780 optional-cert-secrets:0xc00027e6e0 optional-configmaps:0xc00027e140 optional-secrets:0xc00027e0a0 pod:0xc000a81e00 pod-manifest-dir:0xc00027e280 pod-manifests-lock-file:0xc00027e460 resource-dir:0xc00027e1e0 revision:0xc000a81cc0 secrets:0xc000a81ea0 timeout-duration:0xc00027e320 v:0xc00027fcc0 vmodule:0xc00027fd60] [0xc000a81c20 0xc000a81cc0 0xc000a81d60 0xc000a81e00 0xc000a81ea0 0xc00027e000 0xc00027e0a0 0xc00027e140 0xc00027e1e0 0xc00027e280 0xc00027e320 0xc00027e460 0xc00027e5a0 0xc00027e640 0xc00027e6e0 0xc00027e780 0xc00027e820 0xc00027fc20 0xc00027fcc0 0xc00027fd60 0xc00044e3c0] [0xc00027e640 0xc00027e820 0xc00027e5a0 0xc00027e000 0xc00044e3c0 0xc000a81c20 0xc00027fc20 0xc000a81d60 0xc00027e780 0xc00027e6e0 0xc00027e140 0xc00027e0a0 0xc000a81e00 0xc00027e280 0xc00027e460 0xc00027e1e0 0xc000a81cc0 0xc000a81ea0 0xc00027e320 0xc00027fcc0 0xc00027fd60] map[104:0xc00044e3c0 118:0xc00027fcc0] [] -1 0 0xc0007f9b60 true 0xae2140 []} 2026-03-18T13:07:49.557525567Z I0318 13:07:49.557389 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0000dc4e0)({ 2026-03-18T13:07:49.557525567Z KubeConfig: (string) "", 2026-03-18T13:07:49.557525567Z KubeClient: (kubernetes.Interface) , 2026-03-18T13:07:49.557525567Z Revision: (string) (len=1) "1", 2026-03-18T13:07:49.557525567Z NodeName: (string) "", 2026-03-18T13:07:49.557525567Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-18T13:07:49.557525567Z Clock: (clock.RealClock) { 2026-03-18T13:07:49.557525567Z }, 2026-03-18T13:07:49.557525567Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-18T13:07:49.557525567Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-18T13:07:49.557525567Z (string) (len=11) "etcd-client", 2026-03-18T13:07:49.557525567Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-18T13:07:49.557525567Z (string) (len=31) "localhost-recovery-client-token" 2026-03-18T13:07:49.557525567Z }, 2026-03-18T13:07:49.557525567Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-18T13:07:49.557525567Z (string) (len=17) "encryption-config", 2026-03-18T13:07:49.557525567Z (string) (len=21) "webhook-authenticator" 2026-03-18T13:07:49.557525567Z }, 2026-03-18T13:07:49.557525567Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-18T13:07:49.557525567Z (string) (len=18) "kube-apiserver-pod", 2026-03-18T13:07:49.557525567Z (string) (len=6) "config", 2026-03-18T13:07:49.557525567Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-18T13:07:49.557525567Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-18T13:07:49.557525567Z (string) (len=15) "etcd-serving-ca", 2026-03-18T13:07:49.557525567Z (string) (len=18) "kubelet-serving-ca", 2026-03-18T13:07:49.557525567Z (string) (len=22) "sa-token-signing-certs", 2026-03-18T13:07:49.557525567Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-18T13:07:49.557525567Z }, 2026-03-18T13:07:49.557525567Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-18T13:07:49.557525567Z (string) (len=14) "oauth-metadata", 2026-03-18T13:07:49.557525567Z (string) (len=12) "cloud-config", 2026-03-18T13:07:49.557525567Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-18T13:07:49.557525567Z }, 2026-03-18T13:07:49.557525567Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-18T13:07:49.557525567Z (string) (len=17) "aggregator-client", 2026-03-18T13:07:49.557525567Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-18T13:07:49.557525567Z (string) (len=31) "service-network-serving-certkey", 2026-03-18T13:07:49.557525567Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-18T13:07:49.557525567Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-18T13:07:49.557525567Z (string) (len=33) "bound-service-account-signing-key", 2026-03-18T13:07:49.557525567Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-18T13:07:49.557525567Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-18T13:07:49.557525567Z (string) (len=14) "kubelet-client", 2026-03-18T13:07:49.557525567Z (string) (len=16) "node-kubeconfigs" 2026-03-18T13:07:49.557525567Z }, 2026-03-18T13:07:49.557525567Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-18T13:07:49.557525567Z (string) (len=17) "user-serving-cert", 2026-03-18T13:07:49.557525567Z (string) (len=21) "user-serving-cert-000", 2026-03-18T13:07:49.557525567Z (string) (len=21) "user-serving-cert-001", 2026-03-18T13:07:49.557525567Z (string) (len=21) "user-serving-cert-002", 2026-03-18T13:07:49.557525567Z (string) (len=21) "user-serving-cert-003", 2026-03-18T13:07:49.557525567Z (string) (len=21) "user-serving-cert-004", 2026-03-18T13:07:49.557525567Z (string) (len=21) "user-serving-cert-005", 2026-03-18T13:07:49.557525567Z (string) (len=21) "user-serving-cert-006", 2026-03-18T13:07:49.557525567Z (string) (len=21) "user-serving-cert-007", 2026-03-18T13:07:49.557525567Z (string) (len=21) "user-serving-cert-008", 2026-03-18T13:07:49.557525567Z (string) (len=21) "user-serving-cert-009" 2026-03-18T13:07:49.557525567Z }, 2026-03-18T13:07:49.557525567Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-18T13:07:49.557525567Z (string) (len=20) "aggregator-client-ca", 2026-03-18T13:07:49.557525567Z (string) (len=9) "client-ca", 2026-03-18T13:07:49.557525567Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-18T13:07:49.557525567Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-18T13:07:49.557525567Z }, 2026-03-18T13:07:49.557525567Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T13:07:49.557525567Z (string) (len=17) "trusted-ca-bundle" 2026-03-18T13:07:49.557525567Z }, 2026-03-18T13:07:49.557525567Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-18T13:07:49.557525567Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T13:07:49.557525567Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T13:07:49.557525567Z Timeout: (time.Duration) 2m0s, 2026-03-18T13:07:49.557525567Z StaticPodManifestsLockFile: (string) "", 2026-03-18T13:07:49.557525567Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T13:07:49.557525567Z KubeletVersion: (string) "" 2026-03-18T13:07:49.557525567Z }) 2026-03-18T13:07:49.558047600Z I0318 13:07:49.557998 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T13:07:49.570485700Z I0318 13:07:49.570405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T13:07:49.570525541Z I0318 13:07:49.570485 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T13:07:49.570525541Z I0318 13:07:49.570497 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T13:07:49.661442794Z I0318 13:07:49.661360 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-18T13:08:19.781991616Z I0318 13:08:19.781874 1 cmd.go:524] Getting installer pods for node master-0 2026-03-18T13:08:33.785588808Z F0318 13:08:33.785403 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115156522256022674 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"e646632b-0ce3-4cb4-9ed6-aa43b7d0cf41","resourceVersion":"9356","creationTimestamp":"2026-03-18T13:07:46Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.50/23\"],\"mac_address\":\"0a:58:0a:80:00:32\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.50/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.50\"\n ],\n \"mac\": \"0a:58:0a:80:00:32\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"a92b3479-75c1-4a75-9aa1-956b93662e5b"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:35Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:46Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:34Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:34Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:46Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.50","podIPs":[{"ip":"10.128.0.50"}],"startTime":"2026-03-18T13:07:46Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0318 13:07:49.557998 1 cmd.go:413] Getting controller reference for node master-0\nI0318 13:07:49.570405 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0318 13:07:49.570485 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0318 13:07:49.570497 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0318 13:07:49.661360 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0318 13:08:19.781874 1 cmd.go:524] Getting installer pods for node master-0\nF0318 13:08:33.785403 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-18T13:07:49Z","finishedAt":"2026-03-18T13:08:33Z","containerID":"cri-o://31b0fc8784eb8367b69b8a7c847bfd1469f93f534490b89c89aa0c82a72151b2"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://31b0fc8784eb8367b69b8a7c847bfd1469f93f534490b89c89aa0c82a72151b2","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615156522256035774 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-18T13:05:13.736744243Z I0318 13:05:13.736498 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010716315156522256032674 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-18T13:11:59.311258274Z I0318 13:11:59.311208 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:59.330907871Z I0318 13:11:59.330791 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:59.348718237Z I0318 13:11:59.348636 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:59.511912096Z I0318 13:11:59.511857 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:59.530640932Z I0318 13:11:59.530576 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:59.548909143Z I0318 13:11:59.548832 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:59.784742091Z I0318 13:11:59.784685 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:59.784742091Z I0318 13:11:59.784726 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:59.785237808Z I0318 13:11:59.785177 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:59.911469941Z I0318 13:11:59.911381 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:59.930835998Z I0318 13:11:59.930783 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:59.948746137Z I0318 13:11:59.948701 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.120446615Z I0318 13:12:00.120348 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.130627211Z I0318 13:12:00.130571 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.149208412Z I0318 13:12:00.149136 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.311900145Z I0318 13:12:00.311835 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.331270151Z I0318 13:12:00.331200 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.349019506Z I0318 13:12:00.348911 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.511872413Z I0318 13:12:00.511811 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.530322511Z I0318 13:12:00.530257 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.548836049Z I0318 13:12:00.548769 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.710698694Z I0318 13:12:00.710633 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.730793575Z I0318 13:12:00.730732 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.748685003Z I0318 13:12:00.748633 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.911649226Z I0318 13:12:00.911573 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.930477504Z I0318 13:12:00.930388 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:00.947959250Z I0318 13:12:00.947891 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.111450699Z I0318 13:12:01.111373 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.131215419Z I0318 13:12:01.131149 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.148752915Z I0318 13:12:01.148690 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.311093806Z I0318 13:12:01.311030 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.330536896Z I0318 13:12:01.330475 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.348843569Z I0318 13:12:01.348792 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.510886590Z I0318 13:12:01.510831 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.530352940Z I0318 13:12:01.530302 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.548702814Z I0318 13:12:01.548640 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.678632228Z I0318 13:12:01.678499 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=2 seatDemandAvg=0.036409472786875056 seatDemandStdev=0.18751114645216618 seatDemandSmoothed=50.35244337153496 fairFrac=2.331974373907979 currentCL=2 concurrencyDenominator=2 backstop=false 2026-03-18T13:12:01.711169188Z I0318 13:12:01.711084 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.730990711Z I0318 13:12:01.730900 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.749782199Z I0318 13:12:01.749696 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.911125526Z I0318 13:12:01.911050 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.931263880Z I0318 13:12:01.931209 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:01.950532834Z I0318 13:12:01.950443 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.111586222Z I0318 13:12:02.111506 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.130675530Z I0318 13:12:02.130626 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.148946030Z I0318 13:12:02.148878 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.313775143Z I0318 13:12:02.313705 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.331621991Z I0318 13:12:02.331548 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.348481686Z I0318 13:12:02.348395 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.600327010Z I0318 13:12:02.600264 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.600943581Z I0318 13:12:02.600912 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.603944520Z I0318 13:12:02.603891 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.710736203Z I0318 13:12:02.710672 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.731036891Z I0318 13:12:02.730986 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.749438087Z I0318 13:12:02.749364 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.911571911Z I0318 13:12:02.911510 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.931106574Z I0318 13:12:02.931051 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:02.948454174Z I0318 13:12:02.948349 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.111138716Z I0318 13:12:03.111022 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.130620417Z I0318 13:12:03.130553 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.148947779Z I0318 13:12:03.148882 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.310977220Z I0318 13:12:03.310909 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.331141533Z I0318 13:12:03.331093 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.348571408Z I0318 13:12:03.348534 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.511349863Z I0318 13:12:03.511256 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.531356911Z I0318 13:12:03.530867 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.548666450Z I0318 13:12:03.548614 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.711777196Z I0318 13:12:03.711714 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.730931406Z I0318 13:12:03.730883 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.749120875Z I0318 13:12:03.749072 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.911837118Z I0318 13:12:03.911730 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.931315679Z I0318 13:12:03.931261 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:03.949553249Z I0318 13:12:03.949503 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.111520727Z I0318 13:12:04.111467 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.130512282Z I0318 13:12:04.130469 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.149172416Z I0318 13:12:04.149114 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.311758624Z I0318 13:12:04.311697 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.331170633Z I0318 13:12:04.331125 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.349283279Z I0318 13:12:04.349225 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.511598040Z I0318 13:12:04.511512 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.531299038Z I0318 13:12:04.531209 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.548753362Z I0318 13:12:04.548700 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.711656241Z I0318 13:12:04.711589 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.731141462Z I0318 13:12:04.731040 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.748947847Z I0318 13:12:04.748886 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.911838017Z I0318 13:12:04.911771 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:04.949398392Z I0318 13:12:04.949338 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:05.111574738Z I0318 13:12:05.111480 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:05.149167164Z I0318 13:12:05.149099 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:05.311171114Z I0318 13:12:05.311055 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:05.348852284Z I0318 13:12:05.348779 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:05.511489915Z I0318 13:12:05.511400 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:05.548929216Z I0318 13:12:05.548870 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:05.749093971Z I0318 13:12:05.749031 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:05.948925626Z I0318 13:12:05.948838 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:06.149286777Z I0318 13:12:06.149195 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:06.348571833Z I0318 13:12:06.348498 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:06.549390480Z I0318 13:12:06.549258 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:06.749483163Z I0318 13:12:06.749342 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:12:06.949175493Z I0318 13:12:06.949111 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015156522256031154 0ustar00000000000000002026-03-18T13:05:09.452806490Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115156522256037031 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-k8tv42026-03-18T13:10:55.837907454Z I0318 13:10:55.837676 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:10:55.837907454Z I0318 13:10:55.837847 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:10:55.838579103Z I0318 13:10:55.838500 1 observer_polling.go:159] Starting file observer 2026-03-18T13:11:08.471753880Z I0318 13:11:08.471512 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-18T13:11:09.129547358Z I0318 13:11:09.129472 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:11:09.129547358Z W0318 13:11:09.129526 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:09.129547358Z W0318 13:11:09.129536 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:09.129582969Z W0318 13:11:09.129547 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:11:09.129582969Z W0318 13:11:09.129555 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:11:09.129582969Z W0318 13:11:09.129561 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:11:09.129582969Z W0318 13:11:09.129567 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:11:09.133590575Z I0318 13:11:09.133539 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:11:09.133633656Z I0318 13:11:09.133601 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:11:09.133659567Z I0318 13:11:09.133642 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:09.133719629Z I0318 13:11:09.133613 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:11:09.133827432Z I0318 13:11:09.133540 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:11:09.133885613Z I0318 13:11:09.133844 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:09.135278223Z I0318 13:11:09.134147 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:11:09.135278223Z I0318 13:11:09.134216 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:11:09.135278223Z I0318 13:11:09.134311 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:11:09.234945829Z I0318 13:11:09.234839 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:09.235467884Z I0318 13:11:09.234822 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:11:09.235573397Z I0318 13:11:09.235548 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:09.288754551Z I0318 13:11:09.286147 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:11:09.288808603Z I0318 13:11:09.288769 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... kube-apiserver-operator_previous.log0000640000000000000000000004470315156522256037235 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-k8tv42026-03-18T13:08:18.499225654Z I0318 13:08:18.499211 1 base_controller.go:159] All StatusSyncer_kube-apiserver post start hooks have been terminated 2026-03-18T13:08:18.499225654Z I0318 13:08:18.492977 1 base_controller.go:123] Shutting down worker of SCCReconcileController controller ... 2026-03-18T13:08:18.499248784Z I0318 13:08:18.499229 1 base_controller.go:113] All SCCReconcileController workers have been terminated 2026-03-18T13:08:18.499248784Z I0318 13:08:18.492992 1 base_controller.go:181] Shutting down kube-apiserver-StartupMonitorPodCondition ... 2026-03-18T13:08:18.499270485Z I0318 13:08:18.492997 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-18T13:08:18.499270485Z I0318 13:08:18.493002 1 base_controller.go:181] Shutting down kube-apiserver-StaticPodState ... 2026-03-18T13:08:18.499270485Z I0318 13:08:18.493008 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-18T13:08:18.499270485Z I0318 13:08:18.493012 1 base_controller.go:181] Shutting down kube-apiserver-InstallerState ... 2026-03-18T13:08:18.499339727Z I0318 13:08:18.493024 1 termination_observer.go:155] Shutting down TerminationObserver 2026-03-18T13:08:18.499339727Z I0318 13:08:18.493028 1 base_controller.go:181] Shutting down Installer ... 2026-03-18T13:08:18.499339727Z I0318 13:08:18.493033 1 base_controller.go:181] Shutting down kube-apiserver-RemoveStaleConditions ... 2026-03-18T13:08:18.499339727Z I0318 13:08:18.493048 1 base_controller.go:181] Shutting down EventWatchController ... 2026-03-18T13:08:18.499339727Z I0318 13:08:18.493058 1 base_controller.go:181] Shutting down ServiceAccountIssuerController ... 2026-03-18T13:08:18.499339727Z I0318 13:08:18.493069 1 base_controller.go:123] Shutting down worker of highCPUUsageAlertController controller ... 2026-03-18T13:08:18.499339727Z I0318 13:08:18.499317 1 base_controller.go:113] All highCPUUsageAlertController workers have been terminated 2026-03-18T13:08:18.499368277Z I0318 13:08:18.493076 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-18T13:08:18.499368277Z I0318 13:08:18.499350 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-18T13:08:18.499368277Z I0318 13:08:18.493085 1 base_controller.go:123] Shutting down worker of cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller ... 2026-03-18T13:08:18.499392218Z I0318 13:08:18.499368 1 base_controller.go:113] All cluster-kube-apiserver-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-18T13:08:18.499392218Z I0318 13:08:18.493094 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-18T13:08:18.499457020Z I0318 13:08:18.499406 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-18T13:08:18.499489861Z I0318 13:08:18.499455 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-18T13:08:18.499489861Z I0318 13:08:18.493101 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodStateFallback controller ... 2026-03-18T13:08:18.499511841Z I0318 13:08:18.499489 1 base_controller.go:113] All kube-apiserver-StaticPodStateFallback workers have been terminated 2026-03-18T13:08:18.499511841Z I0318 13:08:18.499502 1 controller_manager.go:54] kube-apiserver-StaticPodStateFallback controller terminated 2026-03-18T13:08:18.499607244Z I0318 13:08:18.499536 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-18T13:08:18.499607244Z I0318 13:08:18.499558 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-18T13:08:18.499607244Z I0318 13:08:18.493108 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-apiserver controller ... 2026-03-18T13:08:18.499607244Z I0318 13:08:18.499579 1 base_controller.go:113] All StatusSyncer_kube-apiserver workers have been terminated 2026-03-18T13:08:18.499607244Z I0318 13:08:18.493115 1 base_controller.go:123] Shutting down worker of kube-apiserver-StartupMonitorPodCondition controller ... 2026-03-18T13:08:18.499607244Z I0318 13:08:18.499598 1 base_controller.go:113] All kube-apiserver-StartupMonitorPodCondition workers have been terminated 2026-03-18T13:08:18.499638564Z I0318 13:08:18.499609 1 controller_manager.go:54] kube-apiserver-StartupMonitorPodCondition controller terminated 2026-03-18T13:08:18.499638564Z I0318 13:08:18.493121 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodState controller ... 2026-03-18T13:08:18.499638564Z I0318 13:08:18.499627 1 base_controller.go:113] All kube-apiserver-StaticPodState workers have been terminated 2026-03-18T13:08:18.499671995Z I0318 13:08:18.499637 1 controller_manager.go:54] kube-apiserver-StaticPodState controller terminated 2026-03-18T13:08:18.499671995Z I0318 13:08:18.493127 1 base_controller.go:123] Shutting down worker of kube-apiserver-InstallerState controller ... 2026-03-18T13:08:18.499671995Z I0318 13:08:18.493134 1 base_controller.go:123] Shutting down worker of kube-apiserver-RemoveStaleConditions controller ... 2026-03-18T13:08:18.499671995Z I0318 13:08:18.499657 1 base_controller.go:113] All kube-apiserver-InstallerState workers have been terminated 2026-03-18T13:08:18.499671995Z I0318 13:08:18.499664 1 base_controller.go:113] All kube-apiserver-RemoveStaleConditions workers have been terminated 2026-03-18T13:08:18.499696766Z I0318 13:08:18.493140 1 base_controller.go:123] Shutting down worker of EventWatchController controller ... 2026-03-18T13:08:18.499696766Z I0318 13:08:18.499667 1 controller_manager.go:54] kube-apiserver-InstallerState controller terminated 2026-03-18T13:08:18.499696766Z I0318 13:08:18.493146 1 base_controller.go:123] Shutting down worker of ServiceAccountIssuerController controller ... 2026-03-18T13:08:18.499696766Z I0318 13:08:18.499680 1 base_controller.go:113] All EventWatchController workers have been terminated 2026-03-18T13:08:18.499696766Z I0318 13:08:18.499689 1 base_controller.go:113] All ServiceAccountIssuerController workers have been terminated 2026-03-18T13:08:18.499721807Z I0318 13:08:18.493285 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-18T13:08:18.499721807Z I0318 13:08:18.499706 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-18T13:08:18.499721807Z I0318 13:08:18.499716 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-18T13:08:18.499770758Z I0318 13:08:18.493300 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-18T13:08:18.499770758Z I0318 13:08:18.493311 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-18T13:08:18.499770758Z I0318 13:08:18.499742 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-18T13:08:18.499770758Z I0318 13:08:18.499752 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-18T13:08:18.499770758Z I0318 13:08:18.493320 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-18T13:08:18.499795378Z I0318 13:08:18.499769 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-18T13:08:18.499795378Z I0318 13:08:18.499779 1 controller_manager.go:54] RevisionController controller terminated 2026-03-18T13:08:18.499795378Z I0318 13:08:18.493342 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionCondition controller ... 2026-03-18T13:08:18.499818209Z I0318 13:08:18.499798 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionCondition workers have been terminated 2026-03-18T13:08:18.499818209Z I0318 13:08:18.493354 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionPrune controller ... 2026-03-18T13:08:18.499839960Z I0318 13:08:18.499817 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionPrune workers have been terminated 2026-03-18T13:08:18.499839960Z I0318 13:08:18.493361 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionKey controller ... 2026-03-18T13:08:18.499870510Z I0318 13:08:18.499839 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionKey workers have been terminated 2026-03-18T13:08:18.499870510Z I0318 13:08:18.493379 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:08:18.499870510Z I0318 13:08:18.499856 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:08:18.499870510Z I0318 13:08:18.493386 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-18T13:08:18.499895091Z I0318 13:08:18.499873 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-18T13:08:18.499895091Z I0318 13:08:18.499883 1 controller_manager.go:54] PruneController controller terminated 2026-03-18T13:08:18.499895091Z I0318 13:08:18.493392 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:08:18.499918672Z I0318 13:08:18.499899 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:08:18.499918672Z I0318 13:08:18.493398 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:08:18.499940132Z I0318 13:08:18.499918 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:08:18.499940132Z I0318 13:08:18.493525 1 base_controller.go:123] Shutting down worker of BoundSATokenSignerController controller ... 2026-03-18T13:08:18.499961443Z I0318 13:08:18.499936 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2026-03-18T13:08:18.499961443Z I0318 13:08:18.493544 1 base_controller.go:123] Shutting down worker of CertRotationTimeUpgradeableController controller ... 2026-03-18T13:08:18.499961443Z I0318 13:08:18.499955 1 base_controller.go:113] All CertRotationTimeUpgradeableController workers have been terminated 2026-03-18T13:08:18.499984683Z I0318 13:08:18.493551 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionState controller ... 2026-03-18T13:08:18.499984683Z I0318 13:08:18.499975 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionState workers have been terminated 2026-03-18T13:08:18.500005604Z I0318 13:08:18.495465 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"7f048fff-55e4-47d0-81fc-6e9b8b498576", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 1 count 0 on node "master-0": Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/installer-1-master-0": context canceled 2026-03-18T13:08:18.500005604Z I0318 13:08:18.495525 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-18T13:08:18.500031635Z I0318 13:08:18.500015 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-18T13:08:18.500052275Z I0318 13:08:18.500037 1 builder.go:335] server exited 2026-03-18T13:08:18.500052275Z I0318 13:08:18.492155 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-18T13:08:18.500073216Z I0318 13:08:18.497003 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-18T13:08:18.500073216Z I0318 13:08:18.497029 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:08:18.500102876Z I0318 13:08:18.497108 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-169735670/tls.crt::/tmp/serving-cert-169735670/tls.key" 2026-03-18T13:08:18.500123967Z W0318 13:08:18.497917 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-18T13:08:18.500144597Z W0318 13:08:18.500121 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-18T13:08:18.500144597Z W0318 13:08:18.500136 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-18T13:08:18.500458756Z E0318 13:08:18.500384 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-18T13:08:18.500527877Z I0318 13:08:18.500499 1 controller_manager.go:54] cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller terminated 2026-03-18T13:08:18.502204942Z I0318 13:08:18.501899 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-18T13:08:18.502204942Z I0318 13:08:18.501922 1 base_controller.go:113] All Installer workers have been terminated 2026-03-18T13:08:18.502204942Z I0318 13:08:18.501933 1 controller_manager.go:54] Installer controller terminated 2026-03-18T13:08:18.502697594Z E0318 13:08:18.502621 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-18T13:08:18.504845451Z I0318 13:08:18.504780 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-18T13:08:18.504845451Z I0318 13:08:18.504808 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-18T13:08:18.504993915Z E0318 13:08:18.504927 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver\": context canceled, \"assets/kube-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrole-node-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrole-crd-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrolebinding-auth-delegator.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrolebinding-node-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-clusterrolebinding-crd-reader.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-rolebinding-kube-system.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/check-endpoints-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/delegated-incluster-authentication-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/api-usage.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/audit-errors.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-requests.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-basic.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/podsecurity-violations.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-extended.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeAPIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:08:18.506057622Z I0318 13:08:18.506008 1 base_controller.go:123] Shutting down worker of KubeAPIServerStaticResources-StaticResources controller ... 2026-03-18T13:08:18.506090303Z I0318 13:08:18.506055 1 base_controller.go:113] All KubeAPIServerStaticResources-StaticResources workers have been terminated 2026-03-18T13:08:23.490843412Z I0318 13:08:23.490676 1 observer_polling.go:162] Shutting down file observer 2026-03-18T13:08:52.498727717Z E0318 13:08:52.498642 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-18T13:08:52.498727717Z W0318 13:08:52.498694 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-k8tv4.json0000640000000000000000000001362415156522256030025 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-8b68b9d9b-k8tv4","generateName":"kube-apiserver-operator-8b68b9d9b-","namespace":"openshift-kube-apiserver-operator","uid":"34a3a84b-048f-4822-9f05-0e7509327ca2","resourceVersion":"9401","creationTimestamp":"2026-03-18T13:05:34Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"8b68b9d9b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-8b68b9d9b","uid":"5c234ff9-7dd6-4862-8417-df50ec5a7da0","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:53Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:06Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:06Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-03-18T13:06:52Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-18T13:10:55Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:06:53Z","finishedAt":"2026-03-18T13:08:52Z","containerID":"cri-o://f405c7c5758aab122512ec8685660fb5ea0502d97836267e430ea463ff79f592"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://f3ae91480a2e8eb448094d4c03f841ffed318076eee9f40a63820ede2deb2573","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007432015156522256025211 0ustar00000000000000002026-03-18T13:08:08.032375210Z cluster-etcd-operator rev \ 2026-03-18T13:08:08.032375210Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-18T13:08:08.032375210Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-18T13:08:08.032375210Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-18T13:08:08.032375210Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-18T13:08:08.032375210Z securityContext: 2026-03-18T13:08:08.032375210Z privileged: true 2026-03-18T13:08:08.032375210Z resources: 2026-03-18T13:08:08.032375210Z requests: 2026-03-18T13:08:08.032375210Z memory: 50Mi 2026-03-18T13:08:08.032375210Z cpu: 10m 2026-03-18T13:08:08.032375210Z env: 2026-03-18T13:08:08.032375210Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-18T13:08:08.032375210Z value: "https://192.168.32.10:2379" 2026-03-18T13:08:08.032375210Z - name: "ETCDCTL_API" 2026-03-18T13:08:08.032375210Z value: "3" 2026-03-18T13:08:08.032375210Z - name: "ETCDCTL_CACERT" 2026-03-18T13:08:08.032375210Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-18T13:08:08.032375210Z - name: "ETCDCTL_CERT" 2026-03-18T13:08:08.032375210Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-18T13:08:08.032375210Z - name: "ETCDCTL_ENDPOINTS" 2026-03-18T13:08:08.032375210Z value: "https://192.168.32.10:2379" 2026-03-18T13:08:08.032375210Z - name: "ETCDCTL_KEY" 2026-03-18T13:08:08.032375210Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-18T13:08:08.032375210Z - name: "ETCD_CIPHER_SUITES" 2026-03-18T13:08:08.032375210Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-18T13:08:08.032375210Z - name: "ETCD_DATA_DIR" 2026-03-18T13:08:08.032375210Z value: "/var/lib/etcd" 2026-03-18T13:08:08.032375210Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-18T13:08:08.032375210Z value: "2500" 2026-03-18T13:08:08.032375210Z - name: "ETCD_ENABLE_PPROF" 2026-03-18T13:08:08.032486353Z value: "true" 2026-03-18T13:08:08.032486353Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-18T13:08:08.032486353Z value: "1" 2026-03-18T13:08:08.032486353Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-18T13:08:08.032486353Z value: "200ms" 2026-03-18T13:08:08.032486353Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-18T13:08:08.032486353Z value: "5s" 2026-03-18T13:08:08.032486353Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-18T13:08:08.032486353Z value: "500" 2026-03-18T13:08:08.032486353Z - name: "ETCD_IMAGE" 2026-03-18T13:08:08.032486353Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278" 2026-03-18T13:08:08.032486353Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-18T13:08:08.032486353Z value: "existing" 2026-03-18T13:08:08.032486353Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-18T13:08:08.032486353Z value: "8589934592" 2026-03-18T13:08:08.032486353Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-18T13:08:08.032486353Z value: "true" 2026-03-18T13:08:08.032486353Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-18T13:08:08.032486353Z value: "TLS1.2" 2026-03-18T13:08:08.032486353Z - name: "NODE_master_0_ETCD_NAME" 2026-03-18T13:08:08.032486353Z value: "master-0" 2026-03-18T13:08:08.032486353Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-18T13:08:08.032486353Z value: "192.168.32.10" 2026-03-18T13:08:08.032486353Z - name: "NODE_master_0_IP" 2026-03-18T13:08:08.032486353Z value: "192.168.32.10" 2026-03-18T13:08:08.032486353Z volumeMounts: 2026-03-18T13:08:08.032486353Z - mountPath: /var/lib/etcd 2026-03-18T13:08:08.032486353Z name: data-dir 2026-03-18T13:08:08.032486353Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-18T13:08:08.032486353Z name: cert-dir 2026-03-18T13:08:08.032486353Z hostNetwork: true 2026-03-18T13:08:08.032486353Z priority: 2000001000 2026-03-18T13:08:08.032486353Z priorityClassName: system-node-critical 2026-03-18T13:08:08.032486353Z tolerations: 2026-03-18T13:08:08.032486353Z - operator: "Exists" 2026-03-18T13:08:08.032486353Z volumes: 2026-03-18T13:08:08.032486353Z - hostPath: 2026-03-18T13:08:08.032486353Z path: /etc/kubernetes/manifests 2026-03-18T13:08:08.032486353Z name: static-pod-dir 2026-03-18T13:08:08.032486353Z - hostPath: 2026-03-18T13:08:08.032486353Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-18T13:08:08.032486353Z name: resource-dir 2026-03-18T13:08:08.032486353Z - hostPath: 2026-03-18T13:08:08.032486353Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-18T13:08:08.032486353Z name: cert-dir 2026-03-18T13:08:08.032486353Z - hostPath: 2026-03-18T13:08:08.032486353Z path: /var/lib/etcd 2026-03-18T13:08:08.032486353Z type: "" 2026-03-18T13:08:08.032486353Z name: data-dir 2026-03-18T13:08:08.032486353Z - hostPath: 2026-03-18T13:08:08.032486353Z path: /usr/local/bin 2026-03-18T13:08:08.032486353Z name: usr-local-bin 2026-03-18T13:08:08.032486353Z - hostPath: 2026-03-18T13:08:08.032486353Z path: /var/log/etcd 2026-03-18T13:08:08.032486353Z name: log-dir 2026-03-18T13:08:08.032486353Z - hostPath: 2026-03-18T13:08:08.032486353Z path: /etc/kubernetes 2026-03-18T13:08:08.032486353Z name: config-dir 2026-03-18T13:08:08.032486353Z - hostPath: 2026-03-18T13:08:08.032486353Z path: /var/lib/etcd-auto-backup 2026-03-18T13:08:08.032486353Z name: etcd-auto-backup-dir 2026-03-18T13:08:08.042844301Z I0318 13:08:08.042077 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-18T13:08:08.045288553Z I0318 13:08:08.043304 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-18T13:08:08.045288553Z I0318 13:08:08.043318 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-18T13:08:08.045288553Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-18T13:08:22.167260162Z W0318 13:08:22.167003 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.189df16f2c7667be.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:814ffa63-b08e-4de8-b912-8d7f0638230b,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-03-18 13:08:08.043464638 +0000 UTC m=+30.866884816,LastTimestamp:2026-03-18 13:08:08.043464638 +0000 UTC m=+30.866884816,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: Post "https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/events?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615156522256023505 0ustar00000000000000002026-03-18T13:10:45.979502802Z I0318 13:10:45.979138 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215156522256024202 0ustar00000000000000002026-03-18T13:10:35.662463058Z I0318 13:10:35.662202 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-03-18T13:11:11.114666640Z I0318 13:11:11.114597 1 etcdcli_pool.go:70] creating a new cached client 2026-03-18T13:11:16.115356673Z I0318 13:11:16.115233 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615156522256024361 0ustar00000000000000002026-03-18T13:10:35.316406533Z {"level":"info","ts":"2026-03-18T13:10:35.316183Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-18T13:10:35.317787984Z {"level":"info","ts":"2026-03-18T13:10:35.317699Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-03-18T13:10:35.318296048Z {"level":"info","ts":"2026-03-18T13:10:35.318265Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-18T13:10:35.318528375Z {"level":"info","ts":"2026-03-18T13:10:35.318465Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-03-18T13:10:35.318630258Z {"level":"info","ts":"2026-03-18T13:10:35.318598Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc0004cc000/192.168.32.10:9978\""} 2026-03-18T13:10:35.318710080Z {"level":"info","ts":"2026-03-18T13:10:35.318684Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc0004cc000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-03-18T13:10:35.318750521Z {"level":"info","ts":"2026-03-18T13:10:35.318733Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-03-18T13:10:35.319162953Z {"level":"info","ts":"2026-03-18T13:10:35.319115Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-03-18T13:10:35.319252545Z {"level":"info","ts":"2026-03-18T13:10:35.319213Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-03-18T13:10:35.319358498Z {"level":"info","ts":"2026-03-18T13:10:35.319336Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc000130620 } }"} 2026-03-18T13:10:35.319439521Z {"level":"info","ts":"2026-03-18T13:10:35.319392Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-03-18T13:10:35.319509273Z {"level":"info","ts":"2026-03-18T13:10:35.319489Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-03-18T13:10:35.319568374Z {"level":"info","ts":"2026-03-18T13:10:35.319550Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-03-18T13:10:35.319640996Z {"level":"info","ts":"2026-03-18T13:10:35.319548Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T13:10:35.319656967Z {"level":"info","ts":"2026-03-18T13:10:35.319638Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T13:10:35.319802971Z {"level":"info","ts":"2026-03-18T13:10:35.319740Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, CONNECTING"} 2026-03-18T13:10:35.320004207Z {"level":"info","ts":"2026-03-18T13:10:35.319957Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:35.320004207Z {"level":"warn","ts":"2026-03-18T13:10:35.319992Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:35.320050678Z {"level":"info","ts":"2026-03-18T13:10:35.320021Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:35.320086539Z {"level":"info","ts":"2026-03-18T13:10:35.320060Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, TRANSIENT_FAILURE"} 2026-03-18T13:10:35.320099959Z {"level":"info","ts":"2026-03-18T13:10:35.320081Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-03-18T13:10:35.320943314Z {"level":"info","ts":"2026-03-18T13:10:35.320884Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-03-18T13:10:35.320970085Z {"level":"info","ts":"2026-03-18T13:10:35.320945Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-03-18T13:10:35.321485400Z {"level":"info","ts":"2026-03-18T13:10:35.321445Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-03-18T13:10:35.321564662Z {"level":"info","ts":"2026-03-18T13:10:35.321533Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-03-18T13:10:35.321609493Z {"level":"info","ts":"2026-03-18T13:10:35.321587Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-18T13:10:35.321643854Z {"level":"info","ts":"2026-03-18T13:10:35.321627Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-18T13:10:35.321834580Z {"level":"info","ts":"2026-03-18T13:10:35.321795Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-03-18T13:10:36.320254695Z {"level":"info","ts":"2026-03-18T13:10:36.320166Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:36.320296677Z {"level":"info","ts":"2026-03-18T13:10:36.320230Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, IDLE"} 2026-03-18T13:10:36.320437351Z {"level":"info","ts":"2026-03-18T13:10:36.320366Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T13:10:36.320462682Z {"level":"info","ts":"2026-03-18T13:10:36.320407Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T13:10:36.320668908Z {"level":"info","ts":"2026-03-18T13:10:36.320571Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, CONNECTING"} 2026-03-18T13:10:36.320721109Z {"level":"info","ts":"2026-03-18T13:10:36.320690Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:36.320738210Z {"level":"warn","ts":"2026-03-18T13:10:36.320716Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:36.320747760Z {"level":"info","ts":"2026-03-18T13:10:36.320736Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:36.320795271Z {"level":"info","ts":"2026-03-18T13:10:36.320752Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, TRANSIENT_FAILURE"} 2026-03-18T13:10:37.643480981Z {"level":"info","ts":"2026-03-18T13:10:37.643359Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:37.643546153Z {"level":"info","ts":"2026-03-18T13:10:37.643482Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, IDLE"} 2026-03-18T13:10:37.643605525Z {"level":"info","ts":"2026-03-18T13:10:37.643538Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T13:10:37.643621285Z {"level":"info","ts":"2026-03-18T13:10:37.643602Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T13:10:37.643823751Z {"level":"info","ts":"2026-03-18T13:10:37.643743Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, CONNECTING"} 2026-03-18T13:10:37.644165491Z {"level":"info","ts":"2026-03-18T13:10:37.644086Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:37.644165491Z {"level":"warn","ts":"2026-03-18T13:10:37.644127Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:37.644236563Z {"level":"info","ts":"2026-03-18T13:10:37.644164Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:37.644261624Z {"level":"info","ts":"2026-03-18T13:10:37.644205Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, TRANSIENT_FAILURE"} 2026-03-18T13:10:40.307699246Z {"level":"info","ts":"2026-03-18T13:10:40.307604Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:40.307806539Z {"level":"info","ts":"2026-03-18T13:10:40.307787Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, IDLE"} 2026-03-18T13:10:40.307876831Z {"level":"info","ts":"2026-03-18T13:10:40.307845Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T13:10:40.307920462Z {"level":"info","ts":"2026-03-18T13:10:40.307903Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T13:10:40.308058166Z {"level":"info","ts":"2026-03-18T13:10:40.307980Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, CONNECTING"} 2026-03-18T13:10:40.308459968Z {"level":"info","ts":"2026-03-18T13:10:40.308349Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:40.308495759Z {"level":"warn","ts":"2026-03-18T13:10:40.308462Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:40.308544730Z {"level":"info","ts":"2026-03-18T13:10:40.308511Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:40.308604942Z {"level":"info","ts":"2026-03-18T13:10:40.308563Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, TRANSIENT_FAILURE"} 2026-03-18T13:10:43.679236087Z {"level":"info","ts":"2026-03-18T13:10:43.679085Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:43.679236087Z {"level":"info","ts":"2026-03-18T13:10:43.679162Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, IDLE"} 2026-03-18T13:10:43.679236087Z {"level":"info","ts":"2026-03-18T13:10:43.679195Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T13:10:43.679236087Z {"level":"info","ts":"2026-03-18T13:10:43.679221Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T13:10:43.679503885Z {"level":"info","ts":"2026-03-18T13:10:43.679383Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, CONNECTING"} 2026-03-18T13:10:43.686945930Z {"level":"info","ts":"2026-03-18T13:10:43.686905Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-03-18T13:10:43.687013642Z {"level":"info","ts":"2026-03-18T13:10:43.686992Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038fe60, READY"} 2026-03-18T13:10:43.687074073Z {"level":"info","ts":"2026-03-18T13:10:43.687058Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-03-18T13:10:43.687136095Z {"level":"info","ts":"2026-03-18T13:10:43.687113Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013366015156522256022722 0ustar00000000000000002026-03-18T13:12:00.083883623Z {"level":"info","ts":"2026-03-18T13:12:00.083764Z","caller":"traceutil/trace.go:171","msg":"trace[471249129] linearizableReadLoop","detail":"{readStateIndex:11207; appliedIndex:11205; }","duration":"295.446479ms","start":"2026-03-18T13:11:59.788297Z","end":"2026-03-18T13:12:00.083744Z","steps":["trace[471249129] 'read index received' (duration: 11.943153ms)","trace[471249129] 'applied index is now lower than readState.Index' (duration: 283.502426ms)"],"step_count":2} 2026-03-18T13:12:00.083883623Z {"level":"info","ts":"2026-03-18T13:12:00.083866Z","caller":"traceutil/trace.go:171","msg":"trace[1366618434] transaction","detail":"{read_only:false; number_of_response:0; response_revision:10806; }","duration":"296.095812ms","start":"2026-03-18T13:11:59.787751Z","end":"2026-03-18T13:12:00.083847Z","steps":["trace[1366618434] 'process raft request' (duration: 104.655864ms)","trace[1366618434] 'compare' (duration: 191.301933ms)"],"step_count":2} 2026-03-18T13:12:00.084156292Z {"level":"warn","ts":"2026-03-18T13:12:00.084045Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"295.733968ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-packageserver\" ","response":"range_response_count:1 size:2426"} 2026-03-18T13:12:00.084156292Z {"level":"info","ts":"2026-03-18T13:12:00.084081Z","caller":"traceutil/trace.go:171","msg":"trace[1074990587] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-packageserver; range_end:; response_count:1; response_revision:10806; }","duration":"295.7792ms","start":"2026-03-18T13:11:59.788293Z","end":"2026-03-18T13:12:00.084072Z","steps":["trace[1074990587] 'agreement among raft nodes before linearized reading' (duration: 295.708818ms)"],"step_count":1} 2026-03-18T13:12:00.103361513Z {"level":"info","ts":"2026-03-18T13:12:00.103298Z","caller":"traceutil/trace.go:171","msg":"trace[840882896] transaction","detail":"{read_only:false; response_revision:10807; number_of_response:1; }","duration":"143.16137ms","start":"2026-03-18T13:11:59.960124Z","end":"2026-03-18T13:12:00.103286Z","steps":["trace[840882896] 'process raft request' (duration: 143.080847ms)"],"step_count":1} 2026-03-18T13:12:00.108598616Z {"level":"info","ts":"2026-03-18T13:12:00.107944Z","caller":"traceutil/trace.go:171","msg":"trace[1844706583] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10808; }","duration":"176.520817ms","start":"2026-03-18T13:11:59.931405Z","end":"2026-03-18T13:12:00.107926Z","steps":["trace[1844706583] 'agreement among raft nodes before linearized reading' (duration: 176.486096ms)"],"step_count":1} 2026-03-18T13:12:00.108598616Z {"level":"info","ts":"2026-03-18T13:12:00.108170Z","caller":"traceutil/trace.go:171","msg":"trace[2005297801] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10808; }","duration":"195.835423ms","start":"2026-03-18T13:11:59.912313Z","end":"2026-03-18T13:12:00.108149Z","steps":["trace[2005297801] 'agreement among raft nodes before linearized reading' (duration: 195.812213ms)"],"step_count":1} 2026-03-18T13:12:00.108598616Z {"level":"info","ts":"2026-03-18T13:12:00.108243Z","caller":"traceutil/trace.go:171","msg":"trace[1122654719] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-etcd-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10808; }","duration":"121.769557ms","start":"2026-03-18T13:11:59.986462Z","end":"2026-03-18T13:12:00.108232Z","steps":["trace[1122654719] 'agreement among raft nodes before linearized reading' (duration: 121.727256ms)"],"step_count":1} 2026-03-18T13:12:00.108598616Z {"level":"info","ts":"2026-03-18T13:12:00.108395Z","caller":"traceutil/trace.go:171","msg":"trace[934934437] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/olms/cluster; range_end:; response_count:1; response_revision:10808; }","duration":"146.330204ms","start":"2026-03-18T13:11:59.962059Z","end":"2026-03-18T13:12:00.108389Z","steps":["trace[934934437] 'agreement among raft nodes before linearized reading' (duration: 146.304253ms)"],"step_count":1} 2026-03-18T13:12:00.108598616Z {"level":"info","ts":"2026-03-18T13:12:00.108516Z","caller":"traceutil/trace.go:171","msg":"trace[1962872174] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-kube-controller-manager-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10808; }","duration":"196.861146ms","start":"2026-03-18T13:11:59.911641Z","end":"2026-03-18T13:12:00.108502Z","steps":["trace[1962872174] 'agreement among raft nodes before linearized reading' (duration: 196.749632ms)"],"step_count":1} 2026-03-18T13:12:00.108698889Z {"level":"info","ts":"2026-03-18T13:12:00.108632Z","caller":"traceutil/trace.go:171","msg":"trace[873380981] range","detail":"{range_begin:/kubernetes.io/pods; range_end:; response_count:0; response_revision:10808; }","duration":"159.249129ms","start":"2026-03-18T13:11:59.949373Z","end":"2026-03-18T13:12:00.108622Z","steps":["trace[873380981] 'agreement among raft nodes before linearized reading' (duration: 159.234298ms)"],"step_count":1} 2026-03-18T13:12:00.108698889Z {"level":"warn","ts":"2026-03-18T13:12:00.108625Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"320.130442ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/operatorgroups\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T13:12:00.108698889Z {"level":"warn","ts":"2026-03-18T13:12:00.108676Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"222.190819ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/alertingrules.monitoring.openshift.io\" ","response":"range_response_count:1 size:10664"} 2026-03-18T13:12:00.108724570Z {"level":"info","ts":"2026-03-18T13:12:00.108704Z","caller":"traceutil/trace.go:171","msg":"trace[1592379101] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/alertingrules.monitoring.openshift.io; range_end:; response_count:1; response_revision:10808; }","duration":"222.250391ms","start":"2026-03-18T13:11:59.886445Z","end":"2026-03-18T13:12:00.108696Z","steps":["trace[1592379101] 'agreement among raft nodes before linearized reading' (duration: 222.193409ms)"],"step_count":1} 2026-03-18T13:12:00.108749951Z {"level":"warn","ts":"2026-03-18T13:12:00.108695Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"272.718312ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-apiserver-operator/prometheus-k8s\" ","response":"range_response_count:1 size:1170"} 2026-03-18T13:12:00.108749951Z {"level":"warn","ts":"2026-03-18T13:12:00.108721Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"320.259196ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/operator-lifecycle-manager-metrics\" ","response":"range_response_count:1 size:1222"} 2026-03-18T13:12:00.108779592Z {"level":"warn","ts":"2026-03-18T13:12:00.108750Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"297.25987ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/openshift-dns-operator\" ","response":"range_response_count:1 size:1814"} 2026-03-18T13:12:00.108779592Z {"level":"info","ts":"2026-03-18T13:12:00.108759Z","caller":"traceutil/trace.go:171","msg":"trace[1176787474] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/operator-lifecycle-manager-metrics; range_end:; response_count:1; response_revision:10808; }","duration":"320.312098ms","start":"2026-03-18T13:11:59.788437Z","end":"2026-03-18T13:12:00.108750Z","steps":["trace[1176787474] 'agreement among raft nodes before linearized reading' (duration: 320.235135ms)"],"step_count":1} 2026-03-18T13:12:00.108799882Z {"level":"info","ts":"2026-03-18T13:12:00.108763Z","caller":"traceutil/trace.go:171","msg":"trace[94956901] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-apiserver-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10808; }","duration":"272.815925ms","start":"2026-03-18T13:11:59.835930Z","end":"2026-03-18T13:12:00.108746Z","steps":["trace[94956901] 'agreement among raft nodes before linearized reading' (duration: 272.68206ms)"],"step_count":1} 2026-03-18T13:12:00.108819393Z {"level":"info","ts":"2026-03-18T13:12:00.108780Z","caller":"traceutil/trace.go:171","msg":"trace[1697867417] range","detail":"{range_begin:/kubernetes.io/masterleases/192.168.32.10; range_end:; response_count:1; response_revision:10808; }","duration":"175.106941ms","start":"2026-03-18T13:11:59.933665Z","end":"2026-03-18T13:12:00.108772Z","steps":["trace[1697867417] 'agreement among raft nodes before linearized reading' (duration: 175.0827ms)"],"step_count":1} 2026-03-18T13:12:00.108819393Z {"level":"info","ts":"2026-03-18T13:12:00.108692Z","caller":"traceutil/trace.go:171","msg":"trace[339799873] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/operatorgroups; range_end:; response_count:0; response_revision:10808; }","duration":"320.208034ms","start":"2026-03-18T13:11:59.788463Z","end":"2026-03-18T13:12:00.108671Z","steps":["trace[339799873] 'agreement among raft nodes before linearized reading' (duration: 320.109481ms)"],"step_count":1} 2026-03-18T13:12:00.108927277Z {"level":"warn","ts":"2026-03-18T13:12:00.108828Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T13:11:59.788460Z","time spent":"320.360519ms","remote":"[::1]:38360","response type":"/etcdserverpb.KV/Range","request count":0,"request size":54,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/operators.coreos.com/operatorgroups\" limit:1 "} 2026-03-18T13:12:00.108927277Z {"level":"warn","ts":"2026-03-18T13:12:00.108790Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T13:11:59.788397Z","time spent":"320.38515ms","remote":"[::1]:34146","response type":"/etcdserverpb.KV/Range","request count":0,"request size":101,"response count":1,"response size":1246,"request content":"key:\"/kubernetes.io/rolebindings/openshift-operator-lifecycle-manager/operator-lifecycle-manager-metrics\" "} 2026-03-18T13:12:00.108927277Z {"level":"warn","ts":"2026-03-18T13:12:00.108848Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"307.881549ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/certified-operators\" ","response":"range_response_count:1 size:1031"} 2026-03-18T13:12:00.108927277Z {"level":"info","ts":"2026-03-18T13:12:00.108890Z","caller":"traceutil/trace.go:171","msg":"trace[553968082] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/certified-operators; range_end:; response_count:1; response_revision:10808; }","duration":"307.933071ms","start":"2026-03-18T13:11:59.800946Z","end":"2026-03-18T13:12:00.108879Z","steps":["trace[553968082] 'agreement among raft nodes before linearized reading' (duration: 307.853428ms)"],"step_count":1} 2026-03-18T13:12:00.108963318Z {"level":"warn","ts":"2026-03-18T13:12:00.108926Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-18T13:11:59.800937Z","time spent":"307.979572ms","remote":"[::1]:38374","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":1055,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/certified-operators\" "} 2026-03-18T13:12:00.108963318Z {"level":"info","ts":"2026-03-18T13:12:00.108780Z","caller":"traceutil/trace.go:171","msg":"trace[752620787] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-dns-operator; range_end:; response_count:1; response_revision:10808; }","duration":"297.301321ms","start":"2026-03-18T13:11:59.811469Z","end":"2026-03-18T13:12:00.108770Z","steps":["trace[752620787] 'agreement among raft nodes before linearized reading' (duration: 297.245799ms)"],"step_count":1} 2026-03-18T13:12:00.109665401Z {"level":"info","ts":"2026-03-18T13:12:00.108726Z","caller":"traceutil/trace.go:171","msg":"trace[144770680] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config/admin-acks; range_end:; response_count:1; response_revision:10808; }","duration":"172.36035ms","start":"2026-03-18T13:11:59.936356Z","end":"2026-03-18T13:12:00.108717Z","steps":["trace[144770680] 'agreement among raft nodes before linearized reading' (duration: 172.338819ms)"],"step_count":1} 2026-03-18T13:12:00.109665401Z {"level":"warn","ts":"2026-03-18T13:12:00.108971Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"247.442161ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/credentialsrequests.cloudcredential.openshift.io\" ","response":"range_response_count:1 size:9435"} 2026-03-18T13:12:00.109665401Z {"level":"info","ts":"2026-03-18T13:12:00.109019Z","caller":"traceutil/trace.go:171","msg":"trace[771669125] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/credentialsrequests.cloudcredential.openshift.io; range_end:; response_count:1; response_revision:10808; }","duration":"247.512202ms","start":"2026-03-18T13:11:59.861491Z","end":"2026-03-18T13:12:00.109003Z","steps":["trace[771669125] 'agreement among raft nodes before linearized reading' (duration: 247.426619ms)"],"step_count":1} 2026-03-18T13:12:02.234498586Z {"level":"info","ts":"2026-03-18T13:12:02.233715Z","caller":"traceutil/trace.go:171","msg":"trace[2131567446] transaction","detail":"{read_only:false; response_revision:10810; number_of_response:1; }","duration":"270.265742ms","start":"2026-03-18T13:12:01.963394Z","end":"2026-03-18T13:12:02.233660Z","steps":["trace[2131567446] 'process raft request' (duration: 268.341269ms)"],"step_count":1} 2026-03-18T13:12:02.234498586Z {"level":"info","ts":"2026-03-18T13:12:02.233879Z","caller":"traceutil/trace.go:171","msg":"trace[1102862976] linearizableReadLoop","detail":"{readStateIndex:11215; appliedIndex:11213; }","duration":"230.543855ms","start":"2026-03-18T13:12:02.003288Z","end":"2026-03-18T13:12:02.233832Z","steps":["trace[1102862976] 'read index received' (duration: 228.454736ms)","trace[1102862976] 'applied index is now lower than readState.Index' (duration: 2.084429ms)"],"step_count":2} 2026-03-18T13:12:02.234498586Z {"level":"info","ts":"2026-03-18T13:12:02.234223Z","caller":"traceutil/trace.go:171","msg":"trace[1337265496] transaction","detail":"{read_only:false; response_revision:10811; number_of_response:1; }","duration":"233.444411ms","start":"2026-03-18T13:12:02.000598Z","end":"2026-03-18T13:12:02.234042Z","steps":["trace[1337265496] 'process raft request' (duration: 231.393063ms)"],"step_count":1} 2026-03-18T13:12:02.236072317Z {"level":"warn","ts":"2026-03-18T13:12:02.235995Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"247.14542ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/kube-system/insights-operator-auth\" ","response":"range_response_count:1 size:1249"} 2026-03-18T13:12:02.236105348Z {"level":"info","ts":"2026-03-18T13:12:02.236056Z","caller":"traceutil/trace.go:171","msg":"trace[381538861] range","detail":"{range_begin:/kubernetes.io/rolebindings/kube-system/insights-operator-auth; range_end:; response_count:1; response_revision:10811; }","duration":"247.258904ms","start":"2026-03-18T13:12:01.988783Z","end":"2026-03-18T13:12:02.236042Z","steps":["trace[381538861] 'agreement among raft nodes before linearized reading' (duration: 246.134967ms)"],"step_count":1} 2026-03-18T13:12:02.243835302Z {"level":"warn","ts":"2026-03-18T13:12:02.243092Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"281.152379ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/clusterserviceversions.operators.coreos.com\" ","response":"range_response_count:1 size:320280"} 2026-03-18T13:12:02.243835302Z {"level":"info","ts":"2026-03-18T13:12:02.243188Z","caller":"traceutil/trace.go:171","msg":"trace[818662975] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/clusterserviceversions.operators.coreos.com; range_end:; response_count:1; response_revision:10811; }","duration":"281.277924ms","start":"2026-03-18T13:12:01.961888Z","end":"2026-03-18T13:12:02.243166Z","steps":["trace[818662975] 'agreement among raft nodes before linearized reading' (duration: 272.518076ms)"],"step_count":1} 2026-03-18T13:12:02.275858137Z {"level":"info","ts":"2026-03-18T13:12:02.275702Z","caller":"traceutil/trace.go:171","msg":"trace[1271000818] transaction","detail":"{read_only:false; response_revision:10812; number_of_response:1; }","duration":"159.27304ms","start":"2026-03-18T13:12:02.116403Z","end":"2026-03-18T13:12:02.275676Z","steps":["trace[1271000818] 'process raft request' (duration: 159.130035ms)"],"step_count":1} 2026-03-18T13:12:02.276005611Z {"level":"warn","ts":"2026-03-18T13:12:02.275950Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"239.485249ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/control-plane-machine-set-operator\" ","response":"range_response_count:1 size:1040"} 2026-03-18T13:12:02.276005611Z {"level":"info","ts":"2026-03-18T13:12:02.275986Z","caller":"traceutil/trace.go:171","msg":"trace[475548340] range","detail":"{range_begin:/kubernetes.io/clusterroles/control-plane-machine-set-operator; range_end:; response_count:1; response_revision:10812; }","duration":"239.52901ms","start":"2026-03-18T13:12:02.036447Z","end":"2026-03-18T13:12:02.275976Z","steps":["trace[475548340] 'agreement among raft nodes before linearized reading' (duration: 239.453948ms)"],"step_count":1} 2026-03-18T13:12:02.276032962Z {"level":"info","ts":"2026-03-18T13:12:02.275973Z","caller":"traceutil/trace.go:171","msg":"trace[858556434] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10812; }","duration":"163.673185ms","start":"2026-03-18T13:12:02.112274Z","end":"2026-03-18T13:12:02.275948Z","steps":["trace[858556434] 'agreement among raft nodes before linearized reading' (duration: 163.611203ms)"],"step_count":1} 2026-03-18T13:12:02.276127895Z {"level":"info","ts":"2026-03-18T13:12:02.276067Z","caller":"traceutil/trace.go:171","msg":"trace[813575662] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/securitycontextconstraints.security.openshift.io; range_end:; response_count:1; response_revision:10812; }","duration":"189.753493ms","start":"2026-03-18T13:12:02.086300Z","end":"2026-03-18T13:12:02.276054Z","steps":["trace[813575662] 'agreement among raft nodes before linearized reading' (duration: 189.716652ms)"],"step_count":1} 2026-03-18T13:12:02.276252899Z {"level":"warn","ts":"2026-03-18T13:12:02.276203Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"213.803985ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/alertmanagers.monitoring.coreos.com\" ","response":"range_response_count:1 size:309445"} 2026-03-18T13:12:02.276252899Z {"level":"info","ts":"2026-03-18T13:12:02.276217Z","caller":"traceutil/trace.go:171","msg":"trace[34521723] range","detail":"{range_begin:/kubernetes.io/roles/openshift-cluster-machine-approver/machine-approver; range_end:; response_count:1; response_revision:10812; }","duration":"164.389319ms","start":"2026-03-18T13:12:02.111817Z","end":"2026-03-18T13:12:02.276207Z","steps":["trace[34521723] 'agreement among raft nodes before linearized reading' (duration: 164.369798ms)"],"step_count":1} 2026-03-18T13:12:02.276278210Z {"level":"info","ts":"2026-03-18T13:12:02.276249Z","caller":"traceutil/trace.go:171","msg":"trace[1304514929] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/alertmanagers.monitoring.coreos.com; range_end:; response_count:1; response_revision:10812; }","duration":"213.881567ms","start":"2026-03-18T13:12:02.062359Z","end":"2026-03-18T13:12:02.276241Z","steps":["trace[1304514929] 'agreement among raft nodes before linearized reading' (duration: 213.733632ms)"],"step_count":1} 2026-03-18T13:12:02.276400264Z {"level":"info","ts":"2026-03-18T13:12:02.276344Z","caller":"traceutil/trace.go:171","msg":"trace[266362782] range","detail":"{range_begin:/kubernetes.io/pods; range_end:; response_count:0; response_revision:10812; }","duration":"126.496562ms","start":"2026-03-18T13:12:02.149837Z","end":"2026-03-18T13:12:02.276334Z","steps":["trace[266362782] 'agreement among raft nodes before linearized reading' (duration: 126.478231ms)"],"step_count":1} 2026-03-18T13:12:02.276458536Z {"level":"info","ts":"2026-03-18T13:12:02.276402Z","caller":"traceutil/trace.go:171","msg":"trace[57471185] range","detail":"{range_begin:/kubernetes.io/clusterroles/marketplace-operator; range_end:; response_count:1; response_revision:10812; }","duration":"139.933684ms","start":"2026-03-18T13:12:02.136463Z","end":"2026-03-18T13:12:02.276396Z","steps":["trace[57471185] 'agreement among raft nodes before linearized reading' (duration: 139.916474ms)"],"step_count":1} 2026-03-18T13:12:02.276521668Z {"level":"info","ts":"2026-03-18T13:12:02.276484Z","caller":"traceutil/trace.go:171","msg":"trace[1176180587] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10812; }","duration":"145.208008ms","start":"2026-03-18T13:12:02.131272Z","end":"2026-03-18T13:12:02.276480Z","steps":["trace[1176180587] 'agreement among raft nodes before linearized reading' (duration: 145.195337ms)"],"step_count":1} 2026-03-18T13:12:02.276605051Z {"level":"warn","ts":"2026-03-18T13:12:02.276554Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"270.49191ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/operatorgroups\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T13:12:02.276605051Z {"level":"info","ts":"2026-03-18T13:12:02.276580Z","caller":"traceutil/trace.go:171","msg":"trace[47252983] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/configs.operator.openshift.io; range_end:; response_count:1; response_revision:10812; }","duration":"114.687423ms","start":"2026-03-18T13:12:02.161886Z","end":"2026-03-18T13:12:02.276573Z","steps":["trace[47252983] 'agreement among raft nodes before linearized reading' (duration: 114.672552ms)"],"step_count":1} 2026-03-18T13:12:02.276633492Z {"level":"info","ts":"2026-03-18T13:12:02.276595Z","caller":"traceutil/trace.go:171","msg":"trace[1549493417] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/operatorgroups; range_end:; response_count:0; response_revision:10812; }","duration":"270.544091ms","start":"2026-03-18T13:12:02.006042Z","end":"2026-03-18T13:12:02.276586Z","steps":["trace[1549493417] 'agreement among raft nodes before linearized reading' (duration: 270.480669ms)"],"step_count":1} 2026-03-18T13:12:02.276650332Z {"level":"info","ts":"2026-03-18T13:12:02.276630Z","caller":"traceutil/trace.go:171","msg":"trace[774830694] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/subscriptions; range_end:; response_count:0; response_revision:10812; }","duration":"119.146221ms","start":"2026-03-18T13:12:02.157480Z","end":"2026-03-18T13:12:02.276627Z","steps":["trace[774830694] 'agreement among raft nodes before linearized reading' (duration: 119.1373ms)"],"step_count":1} 2026-03-18T13:12:02.276759356Z {"level":"info","ts":"2026-03-18T13:12:02.276717Z","caller":"traceutil/trace.go:171","msg":"trace[1055735294] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-marketplace; range_end:; response_count:1; response_revision:10812; }","duration":"119.349837ms","start":"2026-03-18T13:12:02.157363Z","end":"2026-03-18T13:12:02.276713Z","steps":["trace[1055735294] 'agreement among raft nodes before linearized reading' (duration: 119.335577ms)"],"step_count":1} 2026-03-18T13:12:02.276778757Z {"level":"warn","ts":"2026-03-18T13:12:02.276753Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"265.573037ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-console/prometheus-k8s\" ","response":"range_response_count:0 size:5"} 2026-03-18T13:12:02.276843029Z {"level":"info","ts":"2026-03-18T13:12:02.276781Z","caller":"traceutil/trace.go:171","msg":"trace[1074675587] range","detail":"{range_begin:/kubernetes.io/roles/openshift-console/prometheus-k8s; range_end:; response_count:0; response_revision:10812; }","duration":"265.602178ms","start":"2026-03-18T13:12:02.011171Z","end":"2026-03-18T13:12:02.276773Z","steps":["trace[1074675587] 'agreement among raft nodes before linearized reading' (duration: 265.558037ms)"],"step_count":1} 2026-03-18T13:12:02.277088837Z {"level":"warn","ts":"2026-03-18T13:12:02.277030Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"271.080778ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-packageserver\" ","response":"range_response_count:1 size:2426"} 2026-03-18T13:12:02.277088837Z {"level":"warn","ts":"2026-03-18T13:12:02.277049Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"272.757053ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace\" ","response":"range_response_count:1 size:1024"} 2026-03-18T13:12:02.277088837Z {"level":"info","ts":"2026-03-18T13:12:02.277061Z","caller":"traceutil/trace.go:171","msg":"trace[1318147137] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-packageserver; range_end:; response_count:1; response_revision:10812; }","duration":"271.125039ms","start":"2026-03-18T13:12:02.005929Z","end":"2026-03-18T13:12:02.277054Z","steps":["trace[1318147137] 'agreement among raft nodes before linearized reading' (duration: 271.068758ms)"],"step_count":1} 2026-03-18T13:12:02.277126408Z {"level":"info","ts":"2026-03-18T13:12:02.277080Z","caller":"traceutil/trace.go:171","msg":"trace[232710257] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace; range_end:; response_count:1; response_revision:10812; }","duration":"272.834996ms","start":"2026-03-18T13:12:02.004236Z","end":"2026-03-18T13:12:02.277071Z","steps":["trace[232710257] 'agreement among raft nodes before linearized reading' (duration: 272.778544ms)"],"step_count":1} 2026-03-18T13:12:02.597282490Z {"level":"warn","ts":"2026-03-18T13:12:02.597202Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"264.539093ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T13:12:02.597317371Z {"level":"info","ts":"2026-03-18T13:12:02.597266Z","caller":"traceutil/trace.go:171","msg":"trace[1035514608] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10812; }","duration":"264.639636ms","start":"2026-03-18T13:12:02.332610Z","end":"2026-03-18T13:12:02.597250Z","steps":["trace[1035514608] 'range keys from in-memory index tree' (duration: 264.429699ms)"],"step_count":1} 2026-03-18T13:12:02.597317371Z {"level":"warn","ts":"2026-03-18T13:12:02.597257Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"281.584273ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T13:12:02.597354873Z {"level":"info","ts":"2026-03-18T13:12:02.597320Z","caller":"traceutil/trace.go:171","msg":"trace[107151944] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10812; }","duration":"281.684747ms","start":"2026-03-18T13:12:02.315620Z","end":"2026-03-18T13:12:02.597305Z","steps":["trace[107151944] 'range keys from in-memory index tree' (duration: 281.533372ms)"],"step_count":1} 2026-03-18T13:12:02.597490027Z {"level":"warn","ts":"2026-03-18T13:12:02.597464Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"296.001647ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T13:12:02.597504867Z {"level":"info","ts":"2026-03-18T13:12:02.597483Z","caller":"traceutil/trace.go:171","msg":"trace[1691975915] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:10812; }","duration":"296.08041ms","start":"2026-03-18T13:12:02.301396Z","end":"2026-03-18T13:12:02.597477Z","steps":["trace[1691975915] 'range keys from in-memory index tree' (duration: 295.949066ms)"],"step_count":1} 2026-03-18T13:12:02.597546099Z {"level":"warn","ts":"2026-03-18T13:12:02.597518Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"281.703787ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-console-operator\" ","response":"range_response_count:0 size:5"} 2026-03-18T13:12:02.597564859Z {"level":"info","ts":"2026-03-18T13:12:02.597545Z","caller":"traceutil/trace.go:171","msg":"trace[1344662136] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-console-operator; range_end:; response_count:0; response_revision:10812; }","duration":"281.742809ms","start":"2026-03-18T13:12:02.315796Z","end":"2026-03-18T13:12:02.597539Z","steps":["trace[1344662136] 'range keys from in-memory index tree' (duration: 281.672837ms)"],"step_count":1} 2026-03-18T13:12:02.597607981Z {"level":"warn","ts":"2026-03-18T13:12:02.597533Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"261.052718ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-cloud-controller-manager-operator/cloud-controller-manager-images\" ","response":"range_response_count:1 size:2534"} 2026-03-18T13:12:02.597648383Z {"level":"info","ts":"2026-03-18T13:12:02.597632Z","caller":"traceutil/trace.go:171","msg":"trace[1433157193] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-cloud-controller-manager-operator/cloud-controller-manager-images; range_end:; response_count:1; response_revision:10812; }","duration":"261.172793ms","start":"2026-03-18T13:12:02.336449Z","end":"2026-03-18T13:12:02.597622Z","steps":["trace[1433157193] 'range keys from in-memory index tree' (duration: 260.946925ms)"],"step_count":1} 2026-03-18T13:12:02.597784988Z {"level":"warn","ts":"2026-03-18T13:12:02.597711Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"285.974429ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/dataimages.metal3.io\" ","response":"range_response_count:1 size:4365"} 2026-03-18T13:12:02.597828109Z {"level":"info","ts":"2026-03-18T13:12:02.597794Z","caller":"traceutil/trace.go:171","msg":"trace[1293683754] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/dataimages.metal3.io; range_end:; response_count:1; response_revision:10812; }","duration":"286.097743ms","start":"2026-03-18T13:12:02.311676Z","end":"2026-03-18T13:12:02.597774Z","steps":["trace[1293683754] 'range keys from in-memory index tree' (duration: 285.861655ms)"],"step_count":1} 2026-03-18T13:12:02.597947633Z {"level":"warn","ts":"2026-03-18T13:12:02.597926Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"248.586049ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/events/openshift-route-controller-manager/\" range_end:\"/kubernetes.io/events/openshift-route-controller-manager0\" ","response":"range_response_count:37 size:32846"} 2026-03-18T13:12:02.597985004Z {"level":"info","ts":"2026-03-18T13:12:02.597968Z","caller":"traceutil/trace.go:171","msg":"trace[1684238302] range","detail":"{range_begin:/kubernetes.io/events/openshift-route-controller-manager/; range_end:/kubernetes.io/events/openshift-route-controller-manager0; response_count:37; response_revision:10812; }","duration":"248.65311ms","start":"2026-03-18T13:12:02.349307Z","end":"2026-03-18T13:12:02.597960Z","steps":["trace[1684238302] 'range keys from in-memory index tree' (duration: 248.390342ms)"],"step_count":1} 2026-03-18T13:12:02.598078057Z {"level":"info","ts":"2026-03-18T13:12:02.598038Z","caller":"traceutil/trace.go:171","msg":"trace[108261166] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-cloud-network-config-controller-aws; range_end:; response_count:1; response_revision:10812; }","duration":"136.48068ms","start":"2026-03-18T13:12:02.461547Z","end":"2026-03-18T13:12:02.598028Z","steps":["trace[108261166] 'range keys from in-memory index tree' (duration: 136.356266ms)"],"step_count":1} 2026-03-18T13:12:02.598224882Z {"level":"warn","ts":"2026-03-18T13:12:02.598180Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"240.12882ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace\" ","response":"range_response_count:1 size:1024"} 2026-03-18T13:12:02.598254793Z {"level":"info","ts":"2026-03-18T13:12:02.598226Z","caller":"traceutil/trace.go:171","msg":"trace[173555668] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-marketplace; range_end:; response_count:1; response_revision:10812; }","duration":"240.199462ms","start":"2026-03-18T13:12:02.358009Z","end":"2026-03-18T13:12:02.598208Z","steps":["trace[173555668] 'range keys from in-memory index tree' (duration: 240.035328ms)"],"step_count":1} 2026-03-18T13:12:02.598319045Z {"level":"info","ts":"2026-03-18T13:12:02.598292Z","caller":"traceutil/trace.go:171","msg":"trace[1840348464] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-ingress-operator/ingress-operator; range_end:; response_count:1; response_revision:10812; }","duration":"161.888476ms","start":"2026-03-18T13:12:02.436395Z","end":"2026-03-18T13:12:02.598284Z","steps":["trace[1840348464] 'range keys from in-memory index tree' (duration: 161.71756ms)"],"step_count":1} 2026-03-18T13:12:02.598443279Z {"level":"warn","ts":"2026-03-18T13:12:02.598371Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"237.177923ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-openstack-infra\" ","response":"range_response_count:1 size:1870"} 2026-03-18T13:12:02.598443279Z {"level":"info","ts":"2026-03-18T13:12:02.598403Z","caller":"traceutil/trace.go:171","msg":"trace[1028735759] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-openstack-infra; range_end:; response_count:1; response_revision:10812; }","duration":"237.233394ms","start":"2026-03-18T13:12:02.361163Z","end":"2026-03-18T13:12:02.598396Z","steps":["trace[1028735759] 'range keys from in-memory index tree' (duration: 237.09139ms)"],"step_count":1} 2026-03-18T13:12:02.598518051Z {"level":"info","ts":"2026-03-18T13:12:02.598482Z","caller":"traceutil/trace.go:171","msg":"trace[106413854] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-cluster-machine-approver/cluster-machine-approver; range_end:; response_count:1; response_revision:10812; }","duration":"112.245653ms","start":"2026-03-18T13:12:02.486222Z","end":"2026-03-18T13:12:02.598468Z","steps":["trace[106413854] 'range keys from in-memory index tree' (duration: 112.104178ms)"],"step_count":1} 2026-03-18T13:12:02.598582374Z {"level":"warn","ts":"2026-03-18T13:12:02.598550Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"211.839099ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/system:openshift:scc:hostmount-anyuid-v2\" ","response":"range_response_count:1 size:1228"} 2026-03-18T13:12:02.598593564Z {"level":"info","ts":"2026-03-18T13:12:02.598579Z","caller":"traceutil/trace.go:171","msg":"trace[547867037] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:scc:hostmount-anyuid-v2; range_end:; response_count:1; response_revision:10812; }","duration":"211.897731ms","start":"2026-03-18T13:12:02.386675Z","end":"2026-03-18T13:12:02.598572Z","steps":["trace[547867037] 'range keys from in-memory index tree' (duration: 211.747517ms)"],"step_count":1} 2026-03-18T13:12:02.598644526Z {"level":"info","ts":"2026-03-18T13:12:02.598600Z","caller":"traceutil/trace.go:171","msg":"trace[1056870187] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/consoles/cluster; range_end:; response_count:1; response_revision:10812; }","duration":"187.472608ms","start":"2026-03-18T13:12:02.411119Z","end":"2026-03-18T13:12:02.598591Z","steps":["trace[1056870187] 'range keys from in-memory index tree' (duration: 187.387255ms)"],"step_count":1} 2026-03-18T13:12:02.598826551Z {"level":"warn","ts":"2026-03-18T13:12:02.597669Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"280.024683ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/machine-api\" ","response":"range_response_count:1 size:3080"} 2026-03-18T13:12:02.598842422Z {"level":"info","ts":"2026-03-18T13:12:02.598826Z","caller":"traceutil/trace.go:171","msg":"trace[1376067861] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/machine-api; range_end:; response_count:1; response_revision:10812; }","duration":"281.19019ms","start":"2026-03-18T13:12:02.317626Z","end":"2026-03-18T13:12:02.598816Z","steps":["trace[1376067861] 'range keys from in-memory index tree' (duration: 279.983041ms)"],"step_count":1} 2026-03-18T13:12:04.633614423Z {"level":"warn","ts":"2026-03-18T13:12:04.633523Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"221.865878ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/services/specs/openshift-authentication-operator/metrics\" ","response":"range_response_count:1 size:1847"} 2026-03-18T13:12:04.633614423Z {"level":"info","ts":"2026-03-18T13:12:04.633579Z","caller":"traceutil/trace.go:171","msg":"trace[1330287411] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-authentication-operator/metrics; range_end:; response_count:1; response_revision:10813; }","duration":"221.942452ms","start":"2026-03-18T13:12:04.411628Z","end":"2026-03-18T13:12:04.633570Z","steps":["trace[1330287411] 'range keys from in-memory index tree' (duration: 221.818728ms)"],"step_count":1} 2026-03-18T13:12:04.633614423Z {"level":"info","ts":"2026-03-18T13:12:04.633584Z","caller":"traceutil/trace.go:171","msg":"trace[642193711] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-cluster-samples-operator/cluster-samples-operator; range_end:; response_count:1; response_revision:10813; }","duration":"197.392883ms","start":"2026-03-18T13:12:04.436169Z","end":"2026-03-18T13:12:04.633562Z","steps":["trace[642193711] 'range keys from in-memory index tree' (duration: 197.310011ms)"],"step_count":1} 2026-03-18T13:12:04.633678165Z {"level":"info","ts":"2026-03-18T13:12:04.633625Z","caller":"traceutil/trace.go:171","msg":"trace[1993266924] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-cluster; range_end:; response_count:1; response_revision:10813; }","duration":"147.016386ms","start":"2026-03-18T13:12:04.486601Z","end":"2026-03-18T13:12:04.633618Z","steps":["trace[1993266924] 'range keys from in-memory index tree' (duration: 146.860821ms)"],"step_count":1} 2026-03-18T13:12:04.633678165Z {"level":"info","ts":"2026-03-18T13:12:04.633639Z","caller":"traceutil/trace.go:171","msg":"trace[1705407130] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-image-registry/image-registry-operator; range_end:; response_count:1; response_revision:10813; }","duration":"122.249062ms","start":"2026-03-18T13:12:04.511378Z","end":"2026-03-18T13:12:04.633627Z","steps":["trace[1705407130] 'range keys from in-memory index tree' (duration: 122.144868ms)"],"step_count":1} 2026-03-18T13:12:04.633757878Z {"level":"info","ts":"2026-03-18T13:12:04.633521Z","caller":"traceutil/trace.go:171","msg":"trace[915548640] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10813; }","duration":"121.233928ms","start":"2026-03-18T13:12:04.512255Z","end":"2026-03-18T13:12:04.633489Z","steps":["trace[915548640] 'range keys from in-memory index tree' (duration: 121.188586ms)"],"step_count":1} 2026-03-18T13:12:04.633775298Z {"level":"warn","ts":"2026-03-18T13:12:04.633743Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"224.064751ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T13:12:04.633852791Z {"level":"info","ts":"2026-03-18T13:12:04.633766Z","caller":"traceutil/trace.go:171","msg":"trace[189588049] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10813; }","duration":"224.113553ms","start":"2026-03-18T13:12:04.409646Z","end":"2026-03-18T13:12:04.633760Z","steps":["trace[189588049] 'range keys from in-memory index tree' (duration: 224.01981ms)"],"step_count":1} 2026-03-18T13:12:04.634074408Z {"level":"info","ts":"2026-03-18T13:12:04.633964Z","caller":"traceutil/trace.go:171","msg":"trace[752781086] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10813; }","duration":"102.101218ms","start":"2026-03-18T13:12:04.531851Z","end":"2026-03-18T13:12:04.633952Z","steps":["trace[752781086] 'range keys from in-memory index tree' (duration: 101.607632ms)"],"step_count":1} 2026-03-18T13:12:04.634074408Z {"level":"info","ts":"2026-03-18T13:12:04.633960Z","caller":"traceutil/trace.go:171","msg":"trace[1229277254] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-image-registry-gcs; range_end:; response_count:1; response_revision:10813; }","duration":"172.941479ms","start":"2026-03-18T13:12:04.460993Z","end":"2026-03-18T13:12:04.633934Z","steps":["trace[1229277254] 'range keys from in-memory index tree' (duration: 172.850996ms)"],"step_count":1} 2026-03-18T13:12:05.470457334Z {"level":"info","ts":"2026-03-18T13:12:05.470357Z","caller":"traceutil/trace.go:171","msg":"trace[1270176140] linearizableReadLoop","detail":"{readStateIndex:11219; appliedIndex:11218; }","duration":"133.934627ms","start":"2026-03-18T13:12:05.336402Z","end":"2026-03-18T13:12:05.470337Z","steps":["trace[1270176140] 'read index received' (duration: 9.025617ms)","trace[1270176140] 'applied index is now lower than readState.Index' (duration: 124.90822ms)"],"step_count":2} 2026-03-18T13:12:05.470663991Z {"level":"info","ts":"2026-03-18T13:12:05.470641Z","caller":"traceutil/trace.go:171","msg":"trace[1153212595] range","detail":"{range_begin:/kubernetes.io/pods/openshift-etcd/etcd-master-0; range_end:; response_count:1; response_revision:10813; }","duration":"121.164356ms","start":"2026-03-18T13:12:05.349468Z","end":"2026-03-18T13:12:05.470632Z","steps":["trace[1153212595] 'agreement among raft nodes before linearized reading' (duration: 121.115395ms)"],"step_count":1} 2026-03-18T13:12:05.470717263Z {"level":"info","ts":"2026-03-18T13:12:05.470665Z","caller":"traceutil/trace.go:171","msg":"trace[1141991434] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-etcd-operator/etcd-operator-config; range_end:; response_count:1; response_revision:10813; }","duration":"109.136581ms","start":"2026-03-18T13:12:05.361513Z","end":"2026-03-18T13:12:05.470649Z","steps":["trace[1141991434] 'agreement among raft nodes before linearized reading' (duration: 109.096709ms)"],"step_count":1} 2026-03-18T13:12:05.470771595Z {"level":"info","ts":"2026-03-18T13:12:05.470713Z","caller":"traceutil/trace.go:171","msg":"trace[336569134] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:10813; }","duration":"110.925749ms","start":"2026-03-18T13:12:05.359770Z","end":"2026-03-18T13:12:05.470695Z","steps":["trace[336569134] 'agreement among raft nodes before linearized reading' (duration: 110.902688ms)"],"step_count":1} 2026-03-18T13:12:05.471013603Z {"level":"info","ts":"2026-03-18T13:12:05.470954Z","caller":"traceutil/trace.go:171","msg":"trace[1473566198] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-config; range_end:; response_count:1; response_revision:10813; }","duration":"134.569337ms","start":"2026-03-18T13:12:05.336374Z","end":"2026-03-18T13:12:05.470944Z","steps":["trace[1473566198] 'agreement among raft nodes before linearized reading' (duration: 134.549127ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715156522256023133 0ustar00000000000000002026-03-18T13:08:21.413709787Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-5bb6f9f846-6wq9c/oauth-apiserver_current.log0000640000000000000000000011632615156522256031325 0ustar00000000000000002026-03-18T13:10:07.537839089Z W0318 13:10:07.537725 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:11.549458419Z W0318 13:10:11.549361 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:11.592510646Z E0318 13:10:11.592438 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.592884036Z E0318 13:10:11.592859 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.600618158Z E0318 13:10:11.600542 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.600769081Z E0318 13:10:11.600745 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.600817933Z E0318 13:10:11.600771 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.600944287Z E0318 13:10:11.600552 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.601040289Z E0318 13:10:11.601007 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.601111161Z E0318 13:10:11.601090 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.601299656Z E0318 13:10:11.601268 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.601385898Z E0318 13:10:11.601362 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.619153663Z E0318 13:10:11.619097 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.624346499Z E0318 13:10:11.624291 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.648999954Z E0318 13:10:11.648940 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.653633755Z E0318 13:10:11.653598 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.718558774Z E0318 13:10:11.718479 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.730662641Z E0318 13:10:11.730577 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.730836855Z E0318 13:10:11.730624 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:11.741634398Z E0318 13:10:11.740596 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:12.157499018Z W0318 13:10:12.157447 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:12.487565724Z E0318 13:10:12.487398 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:12.488386455Z E0318 13:10:12.488327 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:12.489197917Z E0318 13:10:12.489154 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:12.489370282Z E0318 13:10:12.489313 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:12.489370282Z E0318 13:10:12.489332 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:12.489548996Z E0318 13:10:12.489498 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:12.489640478Z E0318 13:10:12.489604 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:12.489764802Z E0318 13:10:12.489722 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:12.489913736Z E0318 13:10:12.489865 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:12.490113071Z E0318 13:10:12.490028 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:13.158939070Z W0318 13:10:13.158850 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:14.590786632Z W0318 13:10:14.590669 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:17.387840613Z W0318 13:10:17.387785 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:21.272763006Z W0318 13:10:21.272651 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:28.864215783Z W0318 13:10:28.864138 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:41.613742136Z E0318 13:10:41.613672 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:41.614913141Z E0318 13:10:41.614841 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:41.615182838Z E0318 13:10:41.615135 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:41.615280451Z E0318 13:10:41.615237 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:41.615593720Z E0318 13:10:41.615535 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:41.620998176Z E0318 13:10:41.620940 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:41.621670585Z E0318 13:10:41.621621 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:41.622226171Z E0318 13:10:41.622178 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:41.622739376Z E0318 13:10:41.622681 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:41.623019414Z E0318 13:10:41.622965 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:42.505615467Z E0318 13:10:42.505502 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:42.506313858Z E0318 13:10:42.506217 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:42.506863794Z E0318 13:10:42.506794 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:42.511552109Z E0318 13:10:42.510490 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:42.511552109Z E0318 13:10:42.510932 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:42.511552109Z E0318 13:10:42.511260 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:42.515487083Z E0318 13:10:42.511621 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:42.515487083Z E0318 13:10:42.511746 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:42.515487083Z E0318 13:10:42.512332 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:42.515487083Z E0318 13:10:42.512497 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.603522044Z E0318 13:11:11.603460 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.606960084Z E0318 13:11:11.603753 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.606960084Z E0318 13:11:11.603790 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.606960084Z E0318 13:11:11.603946 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.606960084Z E0318 13:11:11.604003 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.606960084Z E0318 13:11:11.606503 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.606960084Z E0318 13:11:11.606761 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.607010515Z E0318 13:11:11.606954 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.608398605Z E0318 13:11:11.607139 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.608398605Z E0318 13:11:11.607328 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.723688151Z E0318 13:11:11.723617 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.723772093Z E0318 13:11:11.723621 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.729407626Z E0318 13:11:11.729336 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.729814377Z E0318 13:11:11.729754 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:12.520873390Z E0318 13:11:12.520773 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:12.520918252Z E0318 13:11:12.520890 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:12.520918252Z E0318 13:11:12.520908 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:12.521135968Z E0318 13:11:12.520773 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:12.521135968Z E0318 13:11:12.521098 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:12.521158128Z E0318 13:11:12.521129 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:12.521289472Z E0318 13:11:12.521243 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:12.521397565Z E0318 13:11:12.521354 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:12.521397565Z E0318 13:11:12.521390 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:12.524743682Z E0318 13:11:12.524683 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.602007462Z E0318 13:11:41.601961 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.602448507Z E0318 13:11:41.602399 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.602554250Z E0318 13:11:41.602509 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.602753907Z E0318 13:11:41.602737 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.603049836Z E0318 13:11:41.602998 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.617800771Z E0318 13:11:41.617710 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.618895208Z E0318 13:11:41.618080 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.618895208Z E0318 13:11:41.618140 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.618895208Z E0318 13:11:41.618368 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.618895208Z E0318 13:11:41.618444 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:42.529902869Z E0318 13:11:42.529846 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:42.531847553Z E0318 13:11:42.531821 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:42.532176174Z E0318 13:11:42.532160 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:42.532370000Z E0318 13:11:42.532354 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:42.532608688Z E0318 13:11:42.532591 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:42.532805074Z E0318 13:11:42.532788 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:42.533057902Z E0318 13:11:42.533037 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:42.533259259Z E0318 13:11:42.533223 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:42.533309361Z E0318 13:11:42.533273 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:42.533527128Z E0318 13:11:42.533498 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7871545946731492367, SKID=40:A2:B1:D7:66:94:41:74:1E:C7:94:D1:98:06:88:0C:E8:0B:21:C1, AKID=A6:72:79:79:0E:74:E6:89:89:09:1B:A3:EC:01:73:D9:80:D1:18:6E failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/logs/router-default-7dcf5569b5-gvmtv/router_current.log0000640000000000000000000002240215156522256027204 0ustar00000000000000002026-03-18T13:11:31.253109109Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:31.253109109Z [-]has-synced failed: Router not synced 2026-03-18T13:11:32.254386407Z I0318 13:11:32.254342 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:32.254386407Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:32.254386407Z [-]has-synced failed: Router not synced 2026-03-18T13:11:33.253288080Z I0318 13:11:33.252775 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:33.253288080Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:33.253288080Z [-]has-synced failed: Router not synced 2026-03-18T13:11:34.253825026Z I0318 13:11:34.253775 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:34.253825026Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:34.253825026Z [-]has-synced failed: Router not synced 2026-03-18T13:11:35.254434805Z I0318 13:11:35.254359 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:35.254434805Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:35.254434805Z [-]has-synced failed: Router not synced 2026-03-18T13:11:36.262647204Z I0318 13:11:36.262556 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:36.262647204Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:36.262647204Z [-]has-synced failed: Router not synced 2026-03-18T13:11:37.300735695Z I0318 13:11:37.300683 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:37.300735695Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:37.300735695Z [-]has-synced failed: Router not synced 2026-03-18T13:11:38.253528352Z I0318 13:11:38.253465 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:38.253528352Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:38.253528352Z [-]has-synced failed: Router not synced 2026-03-18T13:11:39.253377085Z I0318 13:11:39.253319 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:39.253377085Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:39.253377085Z [-]has-synced failed: Router not synced 2026-03-18T13:11:40.253293451Z I0318 13:11:40.253243 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:40.253293451Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:40.253293451Z [-]has-synced failed: Router not synced 2026-03-18T13:11:41.252812234Z I0318 13:11:41.252767 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:41.252812234Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:41.252812234Z [-]has-synced failed: Router not synced 2026-03-18T13:11:42.253719352Z I0318 13:11:42.253665 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:42.253719352Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:42.253719352Z [-]has-synced failed: Router not synced 2026-03-18T13:11:42.954797248Z W0318 13:11:42.954746 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:11:42.954797248Z E0318 13:11:42.954789 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:11:43.253754312Z I0318 13:11:43.253684 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:43.253754312Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:43.253754312Z [-]has-synced failed: Router not synced 2026-03-18T13:11:44.254368622Z I0318 13:11:44.254131 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:44.254368622Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:44.254368622Z [-]has-synced failed: Router not synced 2026-03-18T13:11:45.253217092Z I0318 13:11:45.253140 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:45.253217092Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:45.253217092Z [-]has-synced failed: Router not synced 2026-03-18T13:11:46.253690506Z I0318 13:11:46.253645 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:46.253690506Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:46.253690506Z [-]has-synced failed: Router not synced 2026-03-18T13:11:47.255693641Z I0318 13:11:47.255644 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:47.255693641Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:47.255693641Z [-]has-synced failed: Router not synced 2026-03-18T13:11:48.252692872Z I0318 13:11:48.252635 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:48.252692872Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:48.252692872Z [-]has-synced failed: Router not synced 2026-03-18T13:11:49.254401466Z I0318 13:11:49.253884 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:49.254401466Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:49.254401466Z [-]has-synced failed: Router not synced 2026-03-18T13:11:50.254715296Z I0318 13:11:50.254475 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:50.254715296Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:50.254715296Z [-]has-synced failed: Router not synced 2026-03-18T13:11:51.253113412Z I0318 13:11:51.253052 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:51.253113412Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:51.253113412Z [-]has-synced failed: Router not synced 2026-03-18T13:11:52.253238564Z I0318 13:11:52.253185 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:52.253238564Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:52.253238564Z [-]has-synced failed: Router not synced 2026-03-18T13:11:53.253770561Z I0318 13:11:53.253710 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:53.253770561Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:53.253770561Z [-]has-synced failed: Router not synced 2026-03-18T13:11:54.253696137Z I0318 13:11:54.253613 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:54.253696137Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:54.253696137Z [-]has-synced failed: Router not synced 2026-03-18T13:11:55.254145580Z I0318 13:11:55.254065 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:55.254145580Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:55.254145580Z [-]has-synced failed: Router not synced 2026-03-18T13:11:56.253322342Z I0318 13:11:56.253269 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:56.253322342Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:56.253322342Z [-]has-synced failed: Router not synced 2026-03-18T13:11:57.253051102Z I0318 13:11:57.252998 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:57.253051102Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:57.253051102Z [-]has-synced failed: Router not synced 2026-03-18T13:11:58.253297269Z I0318 13:11:58.253246 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:58.253297269Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:58.253297269Z [-]has-synced failed: Router not synced 2026-03-18T13:11:59.258920463Z I0318 13:11:59.257862 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:11:59.258920463Z [-]backend-http failed: backend reported failure 2026-03-18T13:11:59.258920463Z [-]has-synced failed: Router not synced 2026-03-18T13:12:00.253921297Z I0318 13:12:00.253849 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:12:00.253921297Z [-]backend-http failed: backend reported failure 2026-03-18T13:12:00.253921297Z [-]has-synced failed: Router not synced 2026-03-18T13:12:01.252389095Z I0318 13:12:01.252326 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:12:01.252389095Z [-]backend-http failed: backend reported failure 2026-03-18T13:12:01.252389095Z [-]has-synced failed: Router not synced 2026-03-18T13:12:02.254102811Z I0318 13:12:02.253979 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:12:02.254102811Z [-]backend-http failed: backend reported failure 2026-03-18T13:12:02.254102811Z [-]has-synced failed: Router not synced 2026-03-18T13:12:03.253620424Z I0318 13:12:03.253533 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:12:03.253620424Z [-]backend-http failed: backend reported failure 2026-03-18T13:12:03.253620424Z [-]has-synced failed: Router not synced config/pod/openshift-ingress/logs/router-default-7dcf5569b5-gvmtv/router_previous.log0000640000000000000000000002334715156522256027407 0ustar00000000000000002026-03-18T13:09:37.254304472Z [-]has-synced failed: Router not synced 2026-03-18T13:09:38.254272515Z I0318 13:09:38.254179 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:38.254272515Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:38.254272515Z [-]has-synced failed: Router not synced 2026-03-18T13:09:39.253344654Z I0318 13:09:39.253226 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:39.253344654Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:39.253344654Z [-]has-synced failed: Router not synced 2026-03-18T13:09:40.254155299Z I0318 13:09:40.254053 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:40.254155299Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:40.254155299Z [-]has-synced failed: Router not synced 2026-03-18T13:09:41.253442563Z I0318 13:09:41.253306 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:41.253442563Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:41.253442563Z [-]has-synced failed: Router not synced 2026-03-18T13:09:42.256230150Z I0318 13:09:42.256139 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:42.256230150Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:42.256230150Z [-]has-synced failed: Router not synced 2026-03-18T13:09:43.255403642Z I0318 13:09:43.255307 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:43.255403642Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:43.255403642Z [-]has-synced failed: Router not synced 2026-03-18T13:09:44.260822728Z I0318 13:09:44.260750 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:44.260822728Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:44.260822728Z [-]has-synced failed: Router not synced 2026-03-18T13:09:45.254546457Z I0318 13:09:45.254449 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:45.254546457Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:45.254546457Z [-]has-synced failed: Router not synced 2026-03-18T13:09:46.254339086Z I0318 13:09:46.254236 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:46.254339086Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:46.254339086Z [-]has-synced failed: Router not synced 2026-03-18T13:09:47.253704622Z I0318 13:09:47.253567 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:47.253704622Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:47.253704622Z [-]has-synced failed: Router not synced 2026-03-18T13:09:48.254860457Z I0318 13:09:48.254728 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:48.254860457Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:48.254860457Z [-]has-synced failed: Router not synced 2026-03-18T13:09:49.254045539Z I0318 13:09:49.253890 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:49.254045539Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:49.254045539Z [-]has-synced failed: Router not synced 2026-03-18T13:09:50.253557340Z I0318 13:09:50.253478 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:50.253557340Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:50.253557340Z [-]has-synced failed: Router not synced 2026-03-18T13:09:51.254470868Z I0318 13:09:51.254389 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:51.254470868Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:51.254470868Z [-]has-synced failed: Router not synced 2026-03-18T13:09:52.253466385Z I0318 13:09:52.253327 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:52.253466385Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:52.253466385Z [-]has-synced failed: Router not synced 2026-03-18T13:09:53.254259269Z I0318 13:09:53.254149 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:53.254259269Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:53.254259269Z [-]has-synced failed: Router not synced 2026-03-18T13:09:54.253200596Z I0318 13:09:54.253126 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:54.253200596Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:54.253200596Z [-]has-synced failed: Router not synced 2026-03-18T13:09:55.255124631Z I0318 13:09:55.255034 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:55.255124631Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:55.255124631Z [-]has-synced failed: Router not synced 2026-03-18T13:09:56.256225173Z I0318 13:09:56.256146 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:56.256225173Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:56.256225173Z [-]has-synced failed: Router not synced 2026-03-18T13:09:57.255045476Z I0318 13:09:57.254924 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:57.255045476Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:57.255045476Z [-]has-synced failed: Router not synced 2026-03-18T13:09:58.254193676Z I0318 13:09:58.254097 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:58.254193676Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:58.254193676Z [-]has-synced failed: Router not synced 2026-03-18T13:09:59.254335633Z I0318 13:09:59.254217 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:09:59.254335633Z [-]backend-http failed: backend reported failure 2026-03-18T13:09:59.254335633Z [-]has-synced failed: Router not synced 2026-03-18T13:10:00.254525091Z I0318 13:10:00.254408 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:10:00.254525091Z [-]backend-http failed: backend reported failure 2026-03-18T13:10:00.254525091Z [-]has-synced failed: Router not synced 2026-03-18T13:10:01.253997061Z I0318 13:10:01.253902 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:10:01.253997061Z [-]backend-http failed: backend reported failure 2026-03-18T13:10:01.253997061Z [-]has-synced failed: Router not synced 2026-03-18T13:10:02.254645323Z I0318 13:10:02.254542 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:10:02.254645323Z [-]backend-http failed: backend reported failure 2026-03-18T13:10:02.254645323Z [-]has-synced failed: Router not synced 2026-03-18T13:10:03.253886906Z I0318 13:10:03.253767 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:10:03.253886906Z [-]backend-http failed: backend reported failure 2026-03-18T13:10:03.253886906Z [-]has-synced failed: Router not synced 2026-03-18T13:10:04.254156207Z I0318 13:10:04.253971 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:10:04.254156207Z [-]backend-http failed: backend reported failure 2026-03-18T13:10:04.254156207Z [-]has-synced failed: Router not synced 2026-03-18T13:10:05.253459243Z I0318 13:10:05.253366 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:10:05.253459243Z [-]backend-http failed: backend reported failure 2026-03-18T13:10:05.253459243Z [-]has-synced failed: Router not synced 2026-03-18T13:10:06.253186419Z I0318 13:10:06.253128 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:10:06.253186419Z [-]backend-http failed: backend reported failure 2026-03-18T13:10:06.253186419Z [-]has-synced failed: Router not synced 2026-03-18T13:10:07.254207329Z I0318 13:10:07.253628 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-03-18T13:10:07.254207329Z [-]backend-http failed: backend reported failure 2026-03-18T13:10:07.254207329Z [-]has-synced failed: Router not synced 2026-03-18T13:10:13.714467264Z W0318 13:10:13.713029 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:10:13.714467264Z E0318 13:10:13.713062 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-18T13:10:21.421513878Z E0318 13:10:21.421405 1 factory.go:130] failed to sync cache for *v1.Route shared informer 2026-03-18T13:10:21.422715890Z I0318 13:10:21.422678 1 template.go:844] "msg"="Shutdown requested, waiting 45s for new connections to cease" "logger"="router" 2026-03-18T13:10:21.426071188Z E0318 13:10:21.425996 1 haproxy.go:418] can't scrape HAProxy: dial unix /var/lib/haproxy/run/haproxy.sock: connect: no such file or directory 2026-03-18T13:10:21.471395323Z I0318 13:10:21.471317 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2026-03-18T13:11:06.425569836Z I0318 13:11:06.425499 1 template.go:846] "msg"="Instructing the template router to terminate" "logger"="router" 2026-03-18T13:11:07.443651968Z I0318 13:11:07.443582 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Shutting down\n" 2026-03-18T13:11:07.443651968Z I0318 13:11:07.443614 1 template.go:850] "msg"="Shutdown complete, exiting" "logger"="router" config/pod/openshift-ingress/router-default-7dcf5569b5-gvmtv.json0000640000000000000000000002111215156522256023343 0ustar0000000000000000{"metadata":{"name":"router-default-7dcf5569b5-gvmtv","generateName":"router-default-7dcf5569b5-","namespace":"openshift-ingress","uid":"00375107-9a3b-4161-a90d-72ea8827c5fc","resourceVersion":"9430","creationTimestamp":"2026-03-18T13:07:37Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"677444c44b","pod-template-hash":"7dcf5569b5"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-7dcf5569b5","uid":"aafec70d-f204-4101-b398-1214b0c6b8c8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-zlb8t","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-zlb8t","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["677444c44b"]}]}}]},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:08Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:54Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:54Z","reason":"ContainersNotReady","message":"containers with unready status: [router]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:54Z","reason":"ContainersNotReady","message":"containers with unready status: [router]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T13:07:54Z","containerStatuses":[{"name":"router","state":{"running":{"startedAt":"2026-03-18T13:11:08Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:08:07Z","finishedAt":"2026-03-18T13:11:08Z","containerID":"cri-o://9ce3394879cb362e5d7236279a34aac71fedeb577c1dc6ec801d0fa7287bb15c"}},"ready":false,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777","containerID":"cri-o://f14e73371f76e20d73c8968b8d34cca55ee15e6f6c8c8c101d7840ace2efb3fd","started":false,"volumeMounts":[{"name":"default-certificate","mountPath":"/etc/pki/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"stats-auth","mountPath":"/var/lib/haproxy/conf/metrics-auth","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-certs","mountPath":"/etc/pki/tls/metrics-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-zlb8t","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003062415156522256037454 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-sp4ld2026-03-18T13:11:06.675497267Z Copying system trust bundle 2026-03-18T13:11:06.835683188Z W0318 13:11:06.831992 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-18T13:11:06.835683188Z I0318 13:11:06.832664 1 observer_polling.go:159] Starting file observer 2026-03-18T13:11:06.835683188Z I0318 13:11:06.833010 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:11:06.835683188Z I0318 13:11:06.833041 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:11:06.835683188Z I0318 13:11:06.834434 1 observer_polling.go:159] Starting file observer 2026-03-18T13:11:08.468369442Z I0318 13:11:08.468035 1 builder.go:304] cluster-authentication-operator version - 2026-03-18T13:11:08.472537143Z I0318 13:11:08.469295 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:11:08.847390618Z I0318 13:11:08.847308 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-18T13:11:08.850610331Z I0318 13:11:08.850005 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-18T13:11:08.850610331Z I0318 13:11:08.850022 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-18T13:11:08.850610331Z I0318 13:11:08.850040 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-18T13:11:08.850610331Z I0318 13:11:08.850045 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-18T13:11:08.853143914Z I0318 13:11:08.853103 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:11:08.853143914Z W0318 13:11:08.853121 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:08.853143914Z W0318 13:11:08.853126 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:11:08.853143914Z W0318 13:11:08.853130 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:11:08.853143914Z W0318 13:11:08.853133 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:11:08.853143914Z W0318 13:11:08.853136 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:11:08.853143914Z W0318 13:11:08.853139 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:11:08.854925795Z I0318 13:11:08.853267 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-18T13:11:08.858320282Z I0318 13:11:08.856787 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773839229\" (2026-03-18 13:07:13 +0000 UTC to 2028-03-17 13:07:14 +0000 UTC (now=2026-03-18 13:11:08.856767268 +0000 UTC))" 2026-03-18T13:11:08.858320282Z I0318 13:11:08.856884 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839468\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839468\" (2026-03-18 12:11:08 +0000 UTC to 2027-03-18 12:11:08 +0000 UTC (now=2026-03-18 13:11:08.856872011 +0000 UTC))" 2026-03-18T13:11:08.858320282Z I0318 13:11:08.856894 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:11:08.858320282Z I0318 13:11:08.856906 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-18T13:11:08.858320282Z I0318 13:11:08.856921 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:11:08.858320282Z I0318 13:11:08.856946 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:11:08.858320282Z I0318 13:11:08.856964 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:11:08.858320282Z I0318 13:11:08.857048 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:11:08.858320282Z I0318 13:11:08.857130 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:11:08.858320282Z I0318 13:11:08.857136 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:08.858320282Z I0318 13:11:08.857148 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:11:08.858320282Z I0318 13:11:08.857153 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:08.858320282Z I0318 13:11:08.857276 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T13:11:08.858320282Z I0318 13:11:08.857283 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T13:11:08.859201199Z I0318 13:11:08.859167 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-03-18T13:11:08.859633211Z I0318 13:11:08.859597 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-18T13:11:08.859957640Z I0318 13:11:08.859928 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-18T13:11:08.958212695Z I0318 13:11:08.958100 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:11:08.958212695Z I0318 13:11:08.958180 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:11:08.958395510Z I0318 13:11:08.958307 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:11:08.958681058Z I0318 13:11:08.958615 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 12:57:18 +0000 UTC to 2026-03-19 12:57:18 +0000 UTC (now=2026-03-18 13:11:08.958560875 +0000 UTC))" 2026-03-18T13:11:08.959003587Z I0318 13:11:08.958965 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773839229\" (2026-03-18 13:07:13 +0000 UTC to 2028-03-17 13:07:14 +0000 UTC (now=2026-03-18 13:11:08.958920275 +0000 UTC))" 2026-03-18T13:11:08.959342678Z I0318 13:11:08.959307 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839468\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839468\" (2026-03-18 12:11:08 +0000 UTC to 2027-03-18 12:11:08 +0000 UTC (now=2026-03-18 13:11:08.959276076 +0000 UTC))" 2026-03-18T13:11:08.959765990Z I0318 13:11:08.959732 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:50:06 +0000 UTC to 2036-03-15 12:50:06 +0000 UTC (now=2026-03-18 13:11:08.959705518 +0000 UTC))" 2026-03-18T13:11:08.959782330Z I0318 13:11:08.959774 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2026-03-19 12:57:20 +0000 UTC (now=2026-03-18 13:11:08.95975473 +0000 UTC))" 2026-03-18T13:11:08.959831902Z I0318 13:11:08.959803 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2027-03-18 12:57:20 +0000 UTC (now=2026-03-18 13:11:08.95978343 +0000 UTC))" 2026-03-18T13:11:08.959844622Z I0318 13:11:08.959836 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:20 +0000 UTC to 2027-03-18 12:57:20 +0000 UTC (now=2026-03-18 13:11:08.959818541 +0000 UTC))" 2026-03-18T13:11:08.959882503Z I0318 13:11:08.959861 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:57:18 +0000 UTC to 2036-03-15 12:57:18 +0000 UTC (now=2026-03-18 13:11:08.959844752 +0000 UTC))" 2026-03-18T13:11:08.959908204Z I0318 13:11:08.959892 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 12:57:18 +0000 UTC to 2026-03-19 12:57:18 +0000 UTC (now=2026-03-18 13:11:08.959875783 +0000 UTC))" 2026-03-18T13:11:08.960142991Z I0318 13:11:08.960111 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773839229\" (2026-03-18 13:07:13 +0000 UTC to 2028-03-17 13:07:14 +0000 UTC (now=2026-03-18 13:11:08.960086129 +0000 UTC))" 2026-03-18T13:11:08.960393528Z I0318 13:11:08.960358 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839468\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839468\" (2026-03-18 12:11:08 +0000 UTC to 2027-03-18 12:11:08 +0000 UTC (now=2026-03-18 13:11:08.960334636 +0000 UTC))" 2026-03-18T13:11:09.284899700Z I0318 13:11:09.284825 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:11:09.286251959Z I0318 13:11:09.285388 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... authentication-operator_previous.log0000640000000000000000000004416115156522256037647 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-sp4ld2026-03-18T13:08:38.450513960Z I0318 13:08:38.450366 1 base_controller.go:181] Shutting down oauth-server ... 2026-03-18T13:08:38.450579722Z I0318 13:08:38.450382 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressState controller ... 2026-03-18T13:08:38.450664554Z I0318 13:08:38.450600 1 base_controller.go:123] Shutting down worker of openshift-authentication-RemoveStaleConditions controller ... 2026-03-18T13:08:38.450664554Z I0318 13:08:38.450653 1 base_controller.go:113] All openshift-authentication-RemoveStaleConditions workers have been terminated 2026-03-18T13:08:38.450664554Z E0318 13:08:38.450474 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-18T13:08:38.450736036Z I0318 13:08:38.450709 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorCertApprover_OpenShiftAuthenticator controller ... 2026-03-18T13:08:38.450825618Z I0318 13:08:38.450802 1 base_controller.go:113] All WebhookAuthenticatorCertApprover_OpenShiftAuthenticator workers have been terminated 2026-03-18T13:08:38.450881929Z I0318 13:08:38.450746 1 base_controller.go:123] Shutting down worker of oauth-server controller ... 2026-03-18T13:08:38.450946901Z I0318 13:08:38.450923 1 base_controller.go:113] All oauth-server workers have been terminated 2026-03-18T13:08:38.451002683Z E0318 13:08:38.450970 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.oauth.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:08:38.451071894Z I0318 13:08:38.451032 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionCondition ... 2026-03-18T13:08:38.451071894Z I0318 13:08:38.451057 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionPrune ... 2026-03-18T13:08:38.451094155Z I0318 13:08:38.451069 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionMigration ... 2026-03-18T13:08:38.451094155Z I0318 13:08:38.451076 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-18T13:08:38.451094155Z I0318 13:08:38.451080 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-18T13:08:38.451116465Z E0318 13:08:38.450780 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-18T13:08:38.451136066Z I0318 13:08:38.451116 1 leaderelection.go:297] failed to renew lease openshift-authentication-operator/cluster-authentication-operator-lock: timed out waiting for the condition 2026-03-18T13:08:38.451223408Z I0318 13:08:38.450626 1 base_controller.go:113] All openshift-authentication-IngressState workers have been terminated 2026-03-18T13:08:38.451282030Z I0318 13:08:38.450583 1 base_controller.go:123] Shutting down worker of openshift-authentication-UnsupportedConfigOverrides controller ... 2026-03-18T13:08:38.451382492Z I0318 13:08:38.451345 1 genericapiserver.go:640] [graceful-termination] in-flight non long-running request(s) have drained 2026-03-18T13:08:38.451404433Z I0318 13:08:38.451386 1 genericapiserver.go:681] "[graceful-termination] shutdown event" name="InFlightRequestsDrained" 2026-03-18T13:08:38.451453164Z I0318 13:08:38.451440 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-18T13:08:38.451514586Z I0318 13:08:38.450865 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-18T13:08:38.451569827Z I0318 13:08:38.450986 1 base_controller.go:181] Shutting down TrustDistributionController ... 2026-03-18T13:08:38.451624839Z E0318 13:08:38.451022 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": context canceled" 2026-03-18T13:08:38.451704381Z I0318 13:08:38.451652 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionState ... 2026-03-18T13:08:38.451704381Z I0318 13:08:38.451676 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-18T13:08:38.451704381Z I0318 13:08:38.451650 1 base_controller.go:181] Shutting down WebhookAuthenticatorController ... 2026-03-18T13:08:38.451740052Z I0318 13:08:38.450593 1 base_controller.go:123] Shutting down worker of authentication-ManagementState controller ... 2026-03-18T13:08:38.451740052Z I0318 13:08:38.451718 1 base_controller.go:113] All authentication-ManagementState workers have been terminated 2026-03-18T13:08:38.451761252Z I0318 13:08:38.451737 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-oauth-apiserver ... 2026-03-18T13:08:38.451761252Z I0318 13:08:38.451745 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionKey controller ... 2026-03-18T13:08:38.451782143Z I0318 13:08:38.451763 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionState controller ... 2026-03-18T13:08:38.451802123Z I0318 13:08:38.451777 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionState workers have been terminated 2026-03-18T13:08:38.451822004Z I0318 13:08:38.451805 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-18T13:08:38.451846954Z I0318 13:08:38.451833 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-18T13:08:38.451867495Z I0318 13:08:38.451844 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-18T13:08:38.451867495Z E0318 13:08:38.451849 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\": context canceled" 2026-03-18T13:08:38.451888615Z I0318 13:08:38.451856 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressNodesAvailable controller ... 2026-03-18T13:08:38.451888615Z I0318 13:08:38.450779 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-18T13:08:38.451888615Z I0318 13:08:38.451879 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-18T13:08:38.451911226Z I0318 13:08:38.451885 1 base_controller.go:113] All openshift-authentication-IngressNodesAvailable workers have been terminated 2026-03-18T13:08:38.451911226Z I0318 13:08:38.451892 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-18T13:08:38.451911226Z I0318 13:08:38.451352 1 base_controller.go:113] All openshift-authentication-UnsupportedConfigOverrides workers have been terminated 2026-03-18T13:08:38.451933607Z I0318 13:08:38.451627 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionKey ... 2026-03-18T13:08:38.451933607Z I0318 13:08:38.451922 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionKey workers have been terminated 2026-03-18T13:08:38.451933607Z I0318 13:08:38.451091 1 base_controller.go:181] Shutting down RouterCertsDomainValidationController ... 2026-03-18T13:08:38.451956027Z I0318 13:08:38.451870 1 base_controller.go:123] Shutting down worker of StatusSyncer_authentication controller ... 2026-03-18T13:08:38.451956027Z I0318 13:08:38.451943 1 base_controller.go:113] All StatusSyncer_authentication workers have been terminated 2026-03-18T13:08:38.451956027Z I0318 13:08:38.451909 1 base_controller.go:181] Shutting down OAuthAPIServerController-WorkloadWorkloadController ... 2026-03-18T13:08:38.452014419Z I0318 13:08:38.451972 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3226769499/tls.crt::/tmp/serving-cert-3226769499/tls.key" 2026-03-18T13:08:38.452097602Z I0318 13:08:38.452060 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:08:38.452097602Z I0318 13:08:38.452086 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:08:38.452120562Z I0318 13:08:38.452104 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-18T13:08:38.452201505Z I0318 13:08:38.452171 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-18T13:08:38.452271986Z I0318 13:08:38.452247 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-18T13:08:38.452576134Z E0318 13:08:38.452523 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\": context canceled, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:08:38.452612625Z I0318 13:08:38.451509 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-18T13:08:38.452612625Z I0318 13:08:38.452593 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-18T13:08:38.452633526Z I0318 13:08:38.452610 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorController controller ... 2026-03-18T13:08:38.452633526Z I0318 13:08:38.452619 1 base_controller.go:113] All WebhookAuthenticatorController workers have been terminated 2026-03-18T13:08:38.452633526Z I0318 13:08:38.452629 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-18T13:08:38.452655736Z I0318 13:08:38.452637 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-18T13:08:38.452655736Z I0318 13:08:38.452211 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-18T13:08:38.452676277Z I0318 13:08:38.452655 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-18T13:08:38.452676277Z I0318 13:08:38.452663 1 builder.go:335] server exited 2026-03-18T13:08:38.452701817Z I0318 13:08:38.452688 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionMigration controller ... 2026-03-18T13:08:38.452701817Z I0318 13:08:38.452696 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionMigration workers have been terminated 2026-03-18T13:08:38.452722158Z I0318 13:08:38.452706 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionCondition controller ... 2026-03-18T13:08:38.452722158Z I0318 13:08:38.452714 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionCondition workers have been terminated 2026-03-18T13:08:38.452752329Z I0318 13:08:38.452724 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionPrune controller ... 2026-03-18T13:08:38.452752329Z I0318 13:08:38.452732 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionPrune workers have been terminated 2026-03-18T13:08:38.452844361Z I0318 13:08:38.452807 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-18T13:08:38.452844361Z I0318 13:08:38.452831 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-18T13:08:38.452867472Z I0318 13:08:38.451528 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-18T13:08:38.452918943Z I0318 13:08:38.452813 1 base_controller.go:123] Shutting down worker of TrustDistributionController controller ... 2026-03-18T13:08:38.452981135Z I0318 13:08:38.452958 1 base_controller.go:113] All TrustDistributionController workers have been terminated 2026-03-18T13:08:38.453035486Z E0318 13:08:38.452182 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": context canceled, \"oauth-openshift/oauth-service.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:08:38.453097468Z I0318 13:08:38.453059 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-oauth-apiserver controller ... 2026-03-18T13:08:38.453097468Z I0318 13:08:38.453080 1 base_controller.go:113] All NamespaceFinalizerController_openshift-oauth-apiserver workers have been terminated 2026-03-18T13:08:38.453120108Z I0318 13:08:38.453099 1 base_controller.go:181] Shutting down openshift-authentication-ServiceCA ... 2026-03-18T13:08:38.453139709Z I0318 13:08:38.453116 1 base_controller.go:123] Shutting down worker of openshift-authentication-ServiceCA controller ... 2026-03-18T13:08:38.453139709Z I0318 13:08:38.453129 1 base_controller.go:113] All openshift-authentication-ServiceCA workers have been terminated 2026-03-18T13:08:38.453378625Z W0318 13:08:38.453312 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-18T13:08:38.453378625Z E0318 13:08:38.453353 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": context canceled" 2026-03-18T13:08:38.454246607Z I0318 13:08:38.454169 1 base_controller.go:123] Shutting down worker of OpenshiftAuthenticationStaticResources-StaticResources controller ... 2026-03-18T13:08:38.454246607Z I0318 13:08:38.454195 1 base_controller.go:113] All OpenshiftAuthenticationStaticResources-StaticResources workers have been terminated 2026-03-18T13:08:38.454246607Z I0318 13:08:38.454216 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-18T13:08:38.454246607Z I0318 13:08:38.454225 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-18T13:08:38.454943916Z E0318 13:08:38.454833 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": client rate limiter Wait returned an error: context canceled" 2026-03-18T13:08:38.454991328Z I0318 13:08:38.454938 1 base_controller.go:123] Shutting down worker of RouterCertsDomainValidationController controller ... 2026-03-18T13:08:38.454991328Z I0318 13:08:38.454960 1 base_controller.go:113] All RouterCertsDomainValidationController workers have been terminated 2026-03-18T13:08:38.456679141Z I0318 13:08:38.456599 1 base_controller.go:123] Shutting down worker of OAuthAPIServerController-WorkloadWorkloadController controller ... 2026-03-18T13:08:38.456679141Z I0318 13:08:38.456622 1 base_controller.go:113] All OAuthAPIServerController-WorkloadWorkloadController workers have been terminated 2026-03-18T13:08:38.457044040Z E0318 13:08:38.456981 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-18T13:08:38.458224132Z I0318 13:08:38.458162 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-18T13:08:38.458224132Z I0318 13:08:38.458181 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-18T13:08:43.448283355Z I0318 13:08:43.448157 1 observer_polling.go:162] Shutting down file observer 2026-03-18T13:09:12.460962531Z E0318 13:09:12.457573 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-18T13:09:12.460962531Z W0318 13:09:12.457628 1 leaderelection.go:84] leader election lost config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-sp4ld.json0000640000000000000000000001610315156522256030341 0ustar0000000000000000{"metadata":{"name":"authentication-operator-5885bfd7f4-sp4ld","generateName":"authentication-operator-5885bfd7f4-","namespace":"openshift-authentication-operator","uid":"bf9d21f9-64d6-4e21-a985-491197038568","resourceVersion":"9410","creationTimestamp":"2026-03-18T13:05:35Z","labels":{"app":"authentication-operator","pod-template-hash":"5885bfd7f4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.29/23\"],\"mac_address\":\"0a:58:0a:80:00:1d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.29/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.29\"\n ],\n \"mac\": \"0a:58:0a:80:00:1d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-5885bfd7f4","uid":"7f0f2a05-5385-4ec2-86d8-9efb228152d6","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-qgffb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fdcbf7be3f90bd080ffb2c75b091d7eef03681e0f90912ff6140ee48c177616"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.35_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-qgffb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c5"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.29","podIPs":[{"ip":"10.128.0.29"}],"startTime":"2026-03-18T13:06:52Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-18T13:11:06Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:07:07Z","finishedAt":"2026-03-18T13:09:12Z","containerID":"cri-o://e3030c6144549ecf6368b1e14f59622a57b27f9cd532ce32634fa6a2d9e59421"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","containerID":"cri-o://cb973050d91145843fda6519effa669a5d62a92181e514441bd6c04fe69dc004","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-qgffb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000004032215156522256020646 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:01:56Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-7b95f86987 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:08Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-5c9796789 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:09Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-68f85b4d6c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:11Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:11Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:11Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:05:32Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:05:34Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:05:34Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-68f85b4d6c-t84s9","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:05:35Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-7b95f86987-p7vvx","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:05:35Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:05:35Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-5c9796789-z8jkt","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:05:35Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:52Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-p7vvx to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:52Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-5c9796789-z8jkt to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:52Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-t84s9 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:39Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:39Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:39Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:39Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.21/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:39Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.27/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"LeaderElection","message":"package-server-manager-7b95f86987-p7vvx_7d888e42-b50f-40eb-9376-8d84f2433cec became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 14.672s (14.672s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 15.085s (15.085s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:55Z","reason":"RequirementsUnknown","message":"requirements not yet checked","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:56Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:58Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/packageserver-ff75f747c-r46tm to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:58Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:58Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-ff75f747c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:58Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-ff75f747c-r46tm","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:06Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.58/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:07Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:29Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.58:5443/healthz\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:29Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.58:5443/healthz\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:39Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.58:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:39Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.58:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:54Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 1m15.476s (1m15.476s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:59Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.58:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:59Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.58:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:08Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.58:5443/healthz\": dial tcp 10.128.0.58:5443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:08Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.58:5443/healthz\": dial tcp 10.128.0.58:5443: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:10:18Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.21:8443/healthz\": dial tcp 10.128.0.21:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:10:18Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.21:8443/healthz\": dial tcp 10.128.0.21:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:10:18Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.21:8443/healthz\": dial tcp 10.128.0.21:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:10:18Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.21:8443/healthz\": dial tcp 10.128.0.21:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:10:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:10:21Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:10:21Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"}]}events/openshift-route-controller-manager.json0000640000000000000000000002050315156522256020374 0ustar0000000000000000{"items":[{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-688d854df6 to 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:10Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-688d854df6-pbq74 to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:10Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-688d854df6-pbq74","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-688d854df6-pbq74","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-c8db4484 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-688d854df6 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-c8db4484-th8hr","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:15Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-c8db4484-th8hr to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-56d4dd5dfc to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-c8db4484 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:35Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-c8db4484-th8hr","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:35Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-56d4dd5dfc-8qqm4","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.37/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:36Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b\"","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:46Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b\" in 9.561s (9.561s including waiting). Image size: 487096305 bytes.","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Killing","message":"Stopping container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.37:8443/healthz\": EOF\nbody: \n","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.37:8443/healthz\": EOF","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-56d4dd5dfc-8qqm4","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-c8888769b-8mxp6 to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-c8888769b-8mxp6","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-c8888769b to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"ErrorUpdatingResource","message":"addLogicalPort failed for openshift-route-controller-manager/route-controller-manager-56d4dd5dfc-8qqm4: failed to update pod openshift-route-controller-manager/route-controller-manager-56d4dd5dfc-8qqm4: pod \"route-controller-manager-56d4dd5dfc-8qqm4\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"Scheduled","message":"Successfully assigned openshift-route-controller-manager/route-controller-manager-56d4dd5dfc-8qqm4 to master-0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-56d4dd5dfc to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.52/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b\" already present on machine","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"LeaderElection","message":"route-controller-manager-c8888769b-8mxp6_88ad44ab-fb69-4862-b876-0932aac12301 became leader","type":"Normal"}]}events/openshift-controller-manager.json0000640000000000000000000003410315156522256017241 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-f5df8899c to 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:09Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-ca-bundles\" : configmap \"openshift-global-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:09Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : configmap \"config\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:09Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-f5df8899c-4vt5h to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:09Z","reason":"FailedCreate","message":"Error creating: pods \"controller-manager-f5df8899c-\" is forbidden: error looking up service account openshift-controller-manager/openshift-controller-manager-sa: serviceaccount \"openshift-controller-manager-sa\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:09Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-f5df8899c-4vt5h","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:10Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:10Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-59dbf97cf8-p7zns","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:10Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-f5df8899c-4vt5h","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-f5df8899c to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-59dbf97cf8 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:11Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-59dbf97cf8 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:11Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-59dbf97cf8-p7zns to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:11Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-7fdd9495d7-jnhck","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:11Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:11Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-59dbf97cf8-p7zns","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:11Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-7fdd9495d7 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-65c549646c-d9988","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-7fdd9495d7-jnhck to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-65c549646c to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-7fdd9495d7 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:13Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-7fdd9495d7-jnhck","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:15Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:17Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-65c549646c-d9988 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:18Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982\"","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982\" in 3.705s (3.705s including waiting). Image size: 558211175 bytes.","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:22Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:22Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:22Z","reason":"LeaderElection","message":"controller-manager-65c549646c-d9988 became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:35Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-774f95d4b8 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:35Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-774f95d4b8-2gwjr","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:35Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-65c549646c-d9988","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-65c549646c to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:35Z","reason":"Killing","message":"Stopping container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.48/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:37Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-774f95d4b8-2gwjr to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:38Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.48:8443/healthz\": dial tcp 10.128.0.48:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:38Z","reason":"LeaderElection","message":"controller-manager-774f95d4b8-2gwjr became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:38Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.48:8443/healthz\": dial tcp 10.128.0.48:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:38Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:38Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-fffb75699-b7pwr","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"Killing","message":"Stopping container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-774f95d4b8-2gwjr","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:49Z","reason":"ScalingReplicaSet","message":"(combined from similar events): Scaled up replica set controller-manager-fffb75699 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:50Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager/controller-manager-fffb75699-b7pwr to master-0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.53/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:07:55Z","reason":"LeaderElection","message":"controller-manager-fffb75699-b7pwr became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:11:00Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.53:8443/healthz\": dial tcp 10.128.0.53:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:11:00Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.53:8443/healthz\": dial tcp 10.128.0.53:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:11:00Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.53:8443/healthz\": dial tcp 10.128.0.53:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:11:00Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.53:8443/healthz\": dial tcp 10.128.0.53:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-03-18T13:11:07Z","reason":"LeaderElection","message":"controller-manager-fffb75699-b7pwr became leader","type":"Normal"}]}events/openshift-controller-manager-operator.json0000640000000000000000000010071415156522256021074 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:01:54Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-controller-manager-operator-8c94f4649 to 1","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:02:04Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-8c94f4649-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-8c94f4649-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:05:33Z","reason":"SuccessfulCreate","message":"Created pod: openshift-controller-manager-operator-8c94f4649-cpqm5","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:06:52Z","reason":"Scheduled","message":"Successfully assigned openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-cpqm5 to master-0","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:06:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.5/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"build\": map[string]any{\n+ \t\t\"buildDefaults\": map[string]any{\"resources\": map[string]any{}},\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e7030c5cce\"...),\n+ \t\t},\n+ \t},\n+ \t\"controllers\": []any{\n+ \t\tstring(\"openshift.io/build\"), string(\"openshift.io/build-config-change\"),\n+ \t\tstring(\"openshift.io/builder-rolebindings\"),\n+ \t\tstring(\"openshift.io/builder-serviceaccount\"),\n+ \t\tstring(\"-openshift.io/default-rolebindings\"), string(\"openshift.io/deployer\"),\n+ \t\tstring(\"openshift.io/deployer-rolebindings\"),\n+ \t\tstring(\"openshift.io/deployer-serviceaccount\"),\n+ \t\tstring(\"openshift.io/deploymentconfig\"), string(\"openshift.io/image-import\"),\n+ \t\tstring(\"openshift.io/image-puller-rolebindings\"),\n+ \t\tstring(\"openshift.io/image-signature-import\"),\n+ \t\tstring(\"openshift.io/image-trigger\"), string(\"openshift.io/ingress-ip\"),\n+ \t\tstring(\"openshift.io/ingress-to-route\"),\n+ \t\tstring(\"openshift.io/origin-namespace\"), ...,\n+ \t},\n+ \t\"deployer\": map[string]any{\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6e5004457a\"...),\n+ \t\t},\n+ \t},\n+ \t\"featureGates\": []any{string(\"BuildCSIVolumes=true\")},\n+ \t\"ingress\": map[string]any{\"ingressIPNetworkCIDR\": string(\"\")},\n }\n","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"LeaderElection","message":"openshift-controller-manager-operator-8c94f4649-cpqm5_b0c4dc83-3c8a-440e-a123-fce95f01d026 became leader","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"DeploymentCreateFailed","message":"Failed to create Deployment.apps/route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to BuildCSIVolumes=true","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftcontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-route-controller-manager\"}]","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ConfigMapCreateFailed","message":"Failed to create configmap/openshift-service-ca-n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/openshift-global-ca -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"DeploymentCreated","message":"Created Deployment.apps/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/route-controller-manager-sa -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ServiceCreated","message":"Created Service/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-controller-manager-sa -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ServiceCreated","message":"Created Service/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"DeploymentCreated","message":"Created Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/openshift-global-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ConfigMapCreated","message":"Created configmap/openshift-service-ca-n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.openshift-global-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"All is well\" to \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \",Progressing changed from Unknown to True (\"Progressing: deployment/controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 0, desired generation is 1.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: updated replicas is 0, desired replicas is 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\"),Available changed from Unknown to False (\"Available: no pods available on any node.\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \" to \"All is well\",Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 0, desired generation is 1.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: updated replicas is 0, desired replicas is 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\" to \"Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:33Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.client-ca.configmap,data.openshift-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.client-ca.configmap,data.openshift-route-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-route-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-controller-manager version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\",Available message changed from \"Available: no pods available on any node.\" to \"Available: no route controller manager deployment pods available on any node.\",status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/controller-manager -n openshift-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.client-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:49Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 5, desired generation is 6.\\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Created","message":"Created container: openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Started","message":"Started container openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71\" already present on machine","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001156315156522256015453 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:20Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-85f4f795dd to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:20Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-85f4f795dd-9l6gz to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : secret \"etcd-client\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:20Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-85f4f795dd-9l6gz","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:24Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:24Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-85b59d8688 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:24Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-85f4f795dd to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:24Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-85f4f795dd-9l6gz","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:24Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-85b59d8688-wd26k","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:25Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-85b59d8688-wd26k to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:36Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.40/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:47Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" in 11.121s (11.121s including waiting). Image size: 589386806 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:49Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:50Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:50Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:50Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:50Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:07:50Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"}]}events/openshift-apiserver-operator.json0000640000000000000000000007723615156522256017315 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:01:54Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-d65958b8 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:02:04Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:05:35Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:05:35Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-d65958b8-4bqf9","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:06:52Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-4bqf9 to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"LeaderElection","message":"openshift-apiserver-operator-d65958b8-4bqf9_a62411dd-611f-4b8d-9504-89426067049d became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:20Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:20Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:24Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"openshift-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:21Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:21Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007244515156522256020214 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:01:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-dddff6458 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:02:03Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:05:34Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:05:34Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-dddff6458-zm5rd","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:06:52Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-zm5rd to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-dddff6458-zm5rd_8eba2246-1c5b-4423-bab1-e6fbd83fbab4 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:22Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:22Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:22Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:23Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:26Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:30Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:31Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:32Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:36Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:41Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:41Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:46Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:47Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:53Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:11:07Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000516015156522256016351 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.41/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:36Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:37Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:37Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:38Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:38Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:50Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.55/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000012260415156522256022022 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:01:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-ff989d6cc to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:02:03Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:05:35Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-ff989d6cc-n7fn4","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:05:35Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:06:52Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-n7fn4 to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.26/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"LeaderElection","message":"kube-controller-manager-operator-ff989d6cc-n7fn4_a89947a1-ef66-4e5b-9f56-59baacaecb08 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-gcsm8\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:17Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:17Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-gcsm8\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:18Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:20Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:23Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:24Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:24Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:24Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:25Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:34Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:37Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:39Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:39Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:40Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:41Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:41Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:41Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:41Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:42Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:46Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.26:39411-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.26:39411-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:55Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:56Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:57Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:07Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:07Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:11:07Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:11:07Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000563315156522256020173 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.49/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:08:04Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:23Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.59/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:23Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:23Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:23Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:56Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 2","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:57Z","reason":"Created","message":"Created container: kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:57Z","reason":"Started","message":"Started container kube-controller-manager","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215156522256016371 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T13:07:48Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.50/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T13:07:49Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T13:07:49Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000016126115156522256020231 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:02:09Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-8b68b9d9b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:02:11Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:05:34Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-8b68b9d9b-k8tv4","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:05:34Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:52Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-k8tv4 to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"LeaderElection","message":"kube-apiserver-operator-8b68b9d9b-k8tv4_5958ba8f-723b-4ae7-8c1a-66d11cf47fb5 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:54Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:54Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:54Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:54Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:54Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:54Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:54Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:54Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:54Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:54Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"),Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \"),Upgradeable changed from Unknown to True (\"All is well\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:56Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:56Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:56Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:56Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:56Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:57Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:57Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:58Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:58Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:58Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:59Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:59Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:59Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:59Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:59Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:00Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:00Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:00Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:00Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:00Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:00Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:01Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:02Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:02Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:02Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:02Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:02Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:02Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:03Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:03Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:03Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:03Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:03Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:05Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:05Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:05Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:05Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:05Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:05Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:06Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:06Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:06Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:06Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:06Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:06Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:07Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:07Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:17Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:18Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:20Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:26Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmaps \\\"etcd-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:31Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:32Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:33Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:34Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:34Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:41Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:46Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:10:55Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:10:55Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:10:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001260615156522256014371 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:07:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:07:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:07:37Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:07:37Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:08Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:21Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:21Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:35Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:35Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:49Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:49Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:49Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:34Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:34Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:34Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:35Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:35Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:35Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:35Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:35Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:35Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:35Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000003551115156522256016222 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:01:57Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-8544cbcf9c to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:02:07Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:05:34Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:05:34Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-8544cbcf9c-jx4mf","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:06:52Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-8544cbcf9c-jx4mf to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"LeaderElection","message":"etcd-operator-8544cbcf9c-jx4mf_5e4a83e2-3970-4fe9-97ba-e2fec49aad1f became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\\nClusterMemberControllerDegraded: could not get list of unhealthy members: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"EtcdEndpointsErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:18Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:25Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:10:37Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.10:8443/healthz\": dial tcp 10.128.0.10:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:10:37Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.10:8443/healthz\": dial tcp 10.128.0.10:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:11:07Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:11:07Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000444115156522256016566 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:07:35Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-5bb6f9f846-6wq9c to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:07:35Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-5bb6f9f846-6wq9c","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-5bb6f9f846 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:07:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:07:36Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:07:47Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" in 10.954s (10.954s including waiting). Image size: 505345991 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:07:49Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:07:50Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:07:50Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000433215156522256015121 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:07:37Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:07:37Z","reason":"SuccessfulCreate","message":"Created pod: router-default-7dcf5569b5-gvmtv","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:07:37Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-7dcf5569b5 to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:07:54Z","reason":"Scheduled","message":"Successfully assigned openshift-ingress/router-default-7dcf5569b5-gvmtv to master-0","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:07:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:08:06Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777\" in 11.101s (11.101s including waiting). Image size: 487159945 bytes.","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:08:07Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:08:07Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:08:17Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:08:18Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"}]}events/openshift-authentication-operator.json0000640000000000000000000022416615156522256020330 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:01:56Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-5885bfd7f4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:02:06Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:05:35Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:05:35Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-5885bfd7f4-sp4ld","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:06:52Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-5885bfd7f4-sp4ld to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.29/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:06:53Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:08Z","reason":"LeaderElection","message":"authentication-operator-5885bfd7f4-sp4ld_33cae261-b6ff-4d66-b0f4-7c6e503bb655 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-qx4bb\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-qx4bb\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:14Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:16Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:17Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:19Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:19Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:19Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:24Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:25Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:26Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:26Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:26Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:27Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:30Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:34Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:38Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:43Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:43Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:43Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:51Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:51Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:51Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:51Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"oauth-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:52Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.234.141:443/healthz\\\": dial tcp 172.30.234.141:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:09:03Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.29:8443/healthz\": dial tcp 10.128.0.29:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:11:06Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015156522256016301 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-18T13:07:38Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-18T13:07:38Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003543715156522246014624 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":345,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-builder","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-state-metrics","secrets":1},{"name":"metrics-server","secrets":1},{"name":"node-exporter","secrets":1},{"name":"openshift-state-metrics","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1},{"name":"telemeter-client","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015156522245014102 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000004701515156522232014543 0ustar0000000000000000Mar 18 13:10:55.431077 master-0 kubenswrapper[7599]: E0318 13:10:55.430962 7599 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Mar 18 13:10:55.432296 master-0 kubenswrapper[7599]: E0318 13:10:55.431144 7599 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.015s" Mar 18 13:10:56.021797 master-0 kubenswrapper[7599]: I0318 13:10:56.021622 7599 patch_prober.go:28] interesting pod/catalogd-controller-manager-6864dc98f7-q2ndb container/manager namespace/openshift-catalogd: Liveness probe status=failure output="Get \"http://10.128.0.44:8081/healthz\": dial tcp 10.128.0.44:8081: connect: connection refused" start-of-body= Mar 18 13:10:56.021797 master-0 kubenswrapper[7599]: I0318 13:10:56.021702 7599 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-catalogd/catalogd-controller-manager-6864dc98f7-q2ndb" podUID="16f8e725-f18a-478e-88c5-87d54aeb4857" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.44:8081/healthz\": dial tcp 10.128.0.44:8081: connect: connection refused" Mar 18 13:10:56.022303 master-0 kubenswrapper[7599]: I0318 13:10:56.022262 7599 patch_prober.go:28] interesting pod/catalogd-controller-manager-6864dc98f7-q2ndb container/manager namespace/openshift-catalogd: Readiness probe status=failure output="Get \"http://10.128.0.44:8081/readyz\": dial tcp 10.128.0.44:8081: connect: connection refused" start-of-body= Mar 18 13:10:56.022599 master-0 kubenswrapper[7599]: I0318 13:10:56.022553 7599 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-catalogd/catalogd-controller-manager-6864dc98f7-q2ndb" podUID="16f8e725-f18a-478e-88c5-87d54aeb4857" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.44:8081/readyz\": dial tcp 10.128.0.44:8081: connect: connection refused" Mar 18 13:10:56.050607 master-0 kubenswrapper[7599]: I0318 13:10:56.050532 7599 patch_prober.go:28] interesting pod/operator-controller-controller-manager-57777556ff-9bjsj container/manager namespace/openshift-operator-controller: Readiness probe status=failure output="Get \"http://10.128.0.43:8081/readyz\": dial tcp 10.128.0.43:8081: connect: connection refused" start-of-body= Mar 18 13:10:56.050851 master-0 kubenswrapper[7599]: I0318 13:10:56.050619 7599 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-controller/operator-controller-controller-manager-57777556ff-9bjsj" podUID="98e9b9f2-dd2b-4bb0-b2a8-5659a7f95617" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.43:8081/readyz\": dial tcp 10.128.0.43:8081: connect: connection refused" Mar 18 13:10:56.050851 master-0 kubenswrapper[7599]: I0318 13:10:56.050643 7599 patch_prober.go:28] interesting pod/operator-controller-controller-manager-57777556ff-9bjsj container/manager namespace/openshift-operator-controller: Liveness probe status=failure output="Get \"http://10.128.0.43:8081/healthz\": dial tcp 10.128.0.43:8081: connect: connection refused" start-of-body= Mar 18 13:10:56.050851 master-0 kubenswrapper[7599]: I0318 13:10:56.050729 7599 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-operator-controller/operator-controller-controller-manager-57777556ff-9bjsj" podUID="98e9b9f2-dd2b-4bb0-b2a8-5659a7f95617" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.43:8081/healthz\": dial tcp 10.128.0.43:8081: connect: connection refused" Mar 18 13:10:58.083923 master-0 kubenswrapper[7599]: E0318 13:10:58.083665 7599 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{packageserver-ff75f747c-r46tm.189df16f325450a6 openshift-operator-lifecycle-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-operator-lifecycle-manager,Name:packageserver-ff75f747c-r46tm,UID:3ee0f85b-219b-47cb-a22a-67d359a69881,APIVersion:v1,ResourceVersion:8643,FieldPath:spec.containers{packageserver},},Reason:Started,Message:Started container packageserver,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-03-18 13:08:08.141893798 +0000 UTC m=+63.102948030,LastTimestamp:2026-03-18 13:08:08.141893798 +0000 UTC m=+63.102948030,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Mar 18 13:10:58.392382 master-0 kubenswrapper[7599]: I0318 13:10:58.392219 7599 patch_prober.go:28] interesting pod/marketplace-operator-89ccd998f-99pzm container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.16:8080/healthz\": dial tcp 10.128.0.16:8080: connect: connection refused" start-of-body= Mar 18 13:10:58.392382 master-0 kubenswrapper[7599]: I0318 13:10:58.392291 7599 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-89ccd998f-99pzm" podUID="fe643e40-d06d-4e69-9be3-0065c2a78567" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.16:8080/healthz\": dial tcp 10.128.0.16:8080: connect: connection refused" Mar 18 13:10:58.851902 master-0 kubenswrapper[7599]: I0318 13:10:58.851845 7599 patch_prober.go:28] interesting pod/packageserver-ff75f747c-r46tm container/packageserver namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.58:5443/healthz\": dial tcp 10.128.0.58:5443: connect: connection refused" start-of-body= Mar 18 13:10:58.852294 master-0 kubenswrapper[7599]: I0318 13:10:58.852252 7599 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/packageserver-ff75f747c-r46tm" podUID="3ee0f85b-219b-47cb-a22a-67d359a69881" containerName="packageserver" probeResult="failure" output="Get \"https://10.128.0.58:5443/healthz\": dial tcp 10.128.0.58:5443: connect: connection refused" Mar 18 13:10:58.868605 master-0 kubenswrapper[7599]: E0318 13:10:58.868562 7599 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 18 13:11:00.871149 master-0 kubenswrapper[7599]: I0318 13:11:00.871002 7599 patch_prober.go:28] interesting pod/controller-manager-fffb75699-b7pwr container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.53:8443/healthz\": dial tcp 10.128.0.53:8443: connect: connection refused" start-of-body= Mar 18 13:11:00.871149 master-0 kubenswrapper[7599]: I0318 13:11:00.871066 7599 patch_prober.go:28] interesting pod/controller-manager-fffb75699-b7pwr container/controller-manager namespace/openshift-controller-manager: Liveness probe status=failure output="Get \"https://10.128.0.53:8443/healthz\": dial tcp 10.128.0.53:8443: connect: connection refused" start-of-body= Mar 18 13:11:00.871149 master-0 kubenswrapper[7599]: I0318 13:11:00.871121 7599 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-fffb75699-b7pwr" podUID="6a3f37a0-7a87-486e-90b9-d5e15d6ab4c0" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.53:8443/healthz\": dial tcp 10.128.0.53:8443: connect: connection refused" Mar 18 13:11:00.872405 master-0 kubenswrapper[7599]: I0318 13:11:00.871147 7599 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-controller-manager/controller-manager-fffb75699-b7pwr" podUID="6a3f37a0-7a87-486e-90b9-d5e15d6ab4c0" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.53:8443/healthz\": dial tcp 10.128.0.53:8443: connect: connection refused" Mar 18 13:11:05.813368 master-0 kubenswrapper[7599]: E0318 13:11:05.813166 7599 projected.go:194] Error preparing data for projected volume kube-api-access for pod openshift-kube-controller-manager/installer-2-master-0: failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 18 13:11:05.813368 master-0 kubenswrapper[7599]: E0318 13:11:05.813269 7599 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/6a4c87a8-6bf0-43b2-b598-1561cba3e391-kube-api-access podName:6a4c87a8-6bf0-43b2-b598-1561cba3e391 nodeName:}" failed. No retries permitted until 2026-03-18 13:11:13.81324573 +0000 UTC m=+248.774299982 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "kube-api-access" (UniqueName: "kubernetes.io/projected/6a4c87a8-6bf0-43b2-b598-1561cba3e391-kube-api-access") pod "installer-2-master-0" (UID: "6a4c87a8-6bf0-43b2-b598-1561cba3e391") : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 18 13:11:06.021979 master-0 kubenswrapper[7599]: I0318 13:11:06.021865 7599 patch_prober.go:28] interesting pod/catalogd-controller-manager-6864dc98f7-q2ndb container/manager namespace/openshift-catalogd: Readiness probe status=failure output="Get \"http://10.128.0.44:8081/readyz\": dial tcp 10.128.0.44:8081: connect: connection refused" start-of-body= Mar 18 13:11:06.022287 master-0 kubenswrapper[7599]: I0318 13:11:06.021978 7599 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-catalogd/catalogd-controller-manager-6864dc98f7-q2ndb" podUID="16f8e725-f18a-478e-88c5-87d54aeb4857" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.44:8081/readyz\": dial tcp 10.128.0.44:8081: connect: connection refused" Mar 18 13:11:06.050711 master-0 kubenswrapper[7599]: I0318 13:11:06.050573 7599 patch_prober.go:28] interesting pod/operator-controller-controller-manager-57777556ff-9bjsj container/manager namespace/openshift-operator-controller: Readiness probe status=failure output="Get \"http://10.128.0.43:8081/readyz\": dial tcp 10.128.0.43:8081: connect: connection refused" start-of-body= Mar 18 13:11:06.050711 master-0 kubenswrapper[7599]: I0318 13:11:06.050666 7599 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-controller/operator-controller-controller-manager-57777556ff-9bjsj" podUID="98e9b9f2-dd2b-4bb0-b2a8-5659a7f95617" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.43:8081/readyz\": dial tcp 10.128.0.43:8081: connect: connection refused" Mar 18 13:11:06.348115 master-0 kubenswrapper[7599]: E0318 13:11:06.348044 7599 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="10.917s" Mar 18 13:11:08.498296 master-0 kubenswrapper[7599]: E0318 13:11:08.498245 7599 cadvisor_stats_provider.go:516] "Partial failure issuing cadvisor.ContainerInfoV2" err="partial failures: [\"/kubepods.slice/kubepods-pod615539dc_56e1_4489_9aee_33b3e769d4fc.slice/crio-2ce4033218ef99b5e9450dbf20ed2bc82ac943f7fb09ce23f0d76d88d185685f\": RecentStats: unable to find data in memory cache], [\"/kubepods.slice/kubepods-pod615539dc_56e1_4489_9aee_33b3e769d4fc.slice\": RecentStats: unable to find data in memory cache]" Mar 18 13:11:22.468976 master-0 kubenswrapper[7599]: E0318 13:11:22.468915 7599 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"catalog-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=catalog-operator pod=catalog-operator-68f85b4d6c-t84s9_openshift-operator-lifecycle-manager(d2455453-5943-49ef-bfea-cba077197da0)\"" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-t84s9" podUID="d2455453-5943-49ef-bfea-cba077197da0" Mar 18 13:11:26.996651 master-0 kubenswrapper[7599]: E0318 13:11:26.996628 7599 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="615539dc-56e1-4489-9aee-33b3e769d4fc" containerName="installer" Mar 18 13:11:26.996884 master-0 kubenswrapper[7599]: E0318 13:11:26.996870 7599 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e646632b-0ce3-4cb4-9ed6-aa43b7d0cf41" containerName="installer" Mar 18 13:11:26.997075 master-0 kubenswrapper[7599]: E0318 13:11:26.997060 7599 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="250b63d5-21ee-44d3-821e-f42a8112dc50" containerName="installer" Mar 18 13:11:26.997245 master-0 kubenswrapper[7599]: E0318 13:11:26.997232 7599 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="6298bf7b-ba09-4b4a-a0c6-f1989113eb5f" containerName="installer" Mar 18 13:11:26.997415 master-0 kubenswrapper[7599]: E0318 13:11:26.997397 7599 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="814ffa63-b08e-4de8-b912-8d7f0638230b" containerName="installer" Mar 18 13:11:28.083592 master-0 kubenswrapper[7599]: E0318 13:11:28.083548 7599 secret.go:189] Couldn't get secret openshift-monitoring/prometheus-operator-tls: secret "prometheus-operator-tls" not found Mar 18 13:11:28.083678 master-0 kubenswrapper[7599]: E0318 13:11:28.083624 7599 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/fb65c095-ca20-432c-a069-ad6719fca9c8-prometheus-operator-tls podName:fb65c095-ca20-432c-a069-ad6719fca9c8 nodeName:}" failed. No retries permitted until 2026-03-18 13:11:28.583604316 +0000 UTC m=+263.544658558 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "prometheus-operator-tls" (UniqueName: "kubernetes.io/secret/fb65c095-ca20-432c-a069-ad6719fca9c8-prometheus-operator-tls") pod "prometheus-operator-6c8df6d4b-7tcjk" (UID: "fb65c095-ca20-432c-a069-ad6719fca9c8") : secret "prometheus-operator-tls" not found Mar 18 13:11:28.699510 master-0 kubenswrapper[7599]: E0318 13:11:28.699302 7599 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"catalog-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=catalog-operator pod=catalog-operator-68f85b4d6c-t84s9_openshift-operator-lifecycle-manager(d2455453-5943-49ef-bfea-cba077197da0)\"" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-t84s9" podUID="d2455453-5943-49ef-bfea-cba077197da0" Mar 18 13:11:29.549760 master-0 kubenswrapper[7599]: E0318 13:11:29.536661 7599 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"catalog-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=catalog-operator pod=catalog-operator-68f85b4d6c-t84s9_openshift-operator-lifecycle-manager(d2455453-5943-49ef-bfea-cba077197da0)\"" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-t84s9" podUID="d2455453-5943-49ef-bfea-cba077197da0" Mar 18 13:11:35.396470 master-0 kubenswrapper[7599]: E0318 13:11:35.395772 7599 secret.go:189] Couldn't get secret openshift-monitoring/openshift-state-metrics-tls: secret "openshift-state-metrics-tls" not found Mar 18 13:11:35.396470 master-0 kubenswrapper[7599]: E0318 13:11:35.395804 7599 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d325c523-8e6f-4665-9f54-334eaf301141-openshift-state-metrics-tls podName:d325c523-8e6f-4665-9f54-334eaf301141 nodeName:}" failed. No retries permitted until 2026-03-18 13:11:35.895793375 +0000 UTC m=+270.856847617 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "openshift-state-metrics-tls" (UniqueName: "kubernetes.io/secret/d325c523-8e6f-4665-9f54-334eaf301141-openshift-state-metrics-tls") pod "openshift-state-metrics-5dc6c74576-s4ql7" (UID: "d325c523-8e6f-4665-9f54-334eaf301141") : secret "openshift-state-metrics-tls" not found Mar 18 13:11:35.396999 master-0 kubenswrapper[7599]: E0318 13:11:35.396984 7599 secret.go:189] Couldn't get secret openshift-monitoring/kube-state-metrics-tls: secret "kube-state-metrics-tls" not found Mar 18 13:11:35.397095 master-0 kubenswrapper[7599]: E0318 13:11:35.397082 7599 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/6a93ff56-362e-44fc-a54f-666a01559892-kube-state-metrics-tls podName:6a93ff56-362e-44fc-a54f-666a01559892 nodeName:}" failed. No retries permitted until 2026-03-18 13:11:35.897068818 +0000 UTC m=+270.858123060 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-state-metrics-tls" (UniqueName: "kubernetes.io/secret/6a93ff56-362e-44fc-a54f-666a01559892-kube-state-metrics-tls") pod "kube-state-metrics-7bbc969446-mxcng" (UID: "6a93ff56-362e-44fc-a54f-666a01559892") : secret "kube-state-metrics-tls" not found Mar 18 13:11:35.397211 master-0 kubenswrapper[7599]: E0318 13:11:35.397198 7599 secret.go:189] Couldn't get secret openshift-monitoring/node-exporter-tls: secret "node-exporter-tls" not found Mar 18 13:11:35.397287 master-0 kubenswrapper[7599]: E0318 13:11:35.397278 7599 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/702076a9-b542-4768-9e9e-99b2cac0a66e-node-exporter-tls podName:702076a9-b542-4768-9e9e-99b2cac0a66e nodeName:}" failed. No retries permitted until 2026-03-18 13:11:35.897269524 +0000 UTC m=+270.858323836 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-exporter-tls" (UniqueName: "kubernetes.io/secret/702076a9-b542-4768-9e9e-99b2cac0a66e-node-exporter-tls") pod "node-exporter-t4p42" (UID: "702076a9-b542-4768-9e9e-99b2cac0a66e") : secret "node-exporter-tls" not found Mar 18 13:11:48.179427 master-0 kubenswrapper[7599]: E0318 13:11:48.178299 7599 reflector.go:158] "Unhandled Error" err="object-\"openshift-marketplace\"/\"certified-operators-dockercfg-kn6rx\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"certified-operators-dockercfg-kn6rx\" is forbidden: User \"system:node:master-0\" cannot list resource \"secrets\" in API group \"\" in the namespace \"openshift-marketplace\": no relationship found between node 'master-0' and this object" logger="UnhandledError" Mar 18 13:11:49.557948 master-0 kubenswrapper[7599]: I0318 13:11:49.557903 7599 kubelet_pods.go:1000] "Unable to retrieve pull secret, the image pull may not succeed." pod="openshift-marketplace/certified-operators-8wqfk" secret="" err="failed to sync secret cache: timed out waiting for the condition" Mar 18 13:11:51.256394 master-0 kubenswrapper[7599]: E0318 13:11:51.256366 7599 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"25c5b004cbd15a0e41bc1ec41a3336d780436ce4b506da49b6e40d0d6e02e8cd\": container with ID starting with 25c5b004cbd15a0e41bc1ec41a3336d780436ce4b506da49b6e40d0d6e02e8cd not found: ID does not exist" containerID="25c5b004cbd15a0e41bc1ec41a3336d780436ce4b506da49b6e40d0d6e02e8cd" Mar 18 13:11:51.256752 master-0 kubenswrapper[7599]: E0318 13:11:51.256731 7599 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"0081f93aac49349ae24ac36cdf03fb5cb79f65e865fbe1e81aca69accde14cf0\": container with ID starting with 0081f93aac49349ae24ac36cdf03fb5cb79f65e865fbe1e81aca69accde14cf0 not found: ID does not exist" containerID="0081f93aac49349ae24ac36cdf03fb5cb79f65e865fbe1e81aca69accde14cf0" Mar 18 13:11:51.543515 master-0 kubenswrapper[7599]: E0318 13:11:51.543355 7599 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2624f748-2132-40c6-aa2e-52df50ba8911" containerName="kube-rbac-proxy" Mar 18 13:11:51.543515 master-0 kubenswrapper[7599]: E0318 13:11:51.543393 7599 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2624f748-2132-40c6-aa2e-52df50ba8911" containerName="machine-approver-controller"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215156522232020133 0ustar0000000000000000{"unused_machineconfigs_count":21}config/machineconfigs/rendered-worker-2616cb266eed437386123066a53e9331.json0000640000000000000000000004053715156522232023464 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8","machineconfiguration.openshift.io/release-image-version":"4.18.35"},"creationTimestamp":"2026-03-18T13:07:59Z","generation":1,"name":"rendered-worker-2616cb266eed437386123066a53e9331","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"f20187eb-6082-43bc-b9ee-6a6470a6520e"}],"resourceVersion":"9186","uid":"92239383-9674-4c28-b965-6989843c8969"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:565e3659fe92dfb59b50fd56206af6cad94bcc286825b798c2cf1a98aa8d0c6f","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:53d66d524ca3e787d8dbe30dbc4d9b8612c9cebd505ccb4375a8441814e85422 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8a9e8da5c6114f062b814936d4db7a47a04d248e160d6bb28ad4e4a081496ee4 \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f5726322e050cdd4c508be51d2c99a3168eb7535ddc5f2a298df3059ea6c0071"}}config/machineconfigs/rendered-master-483abfa9aef251cf5547e628de8ce0bf.json0000640000000000000000000004332715156522232024341 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"393b8dc2c216dbbbf68cd1ccde5cbc2b551b2fe8","machineconfiguration.openshift.io/release-image-version":"4.18.35"},"creationTimestamp":"2026-03-18T13:07:59Z","generation":1,"name":"rendered-master-483abfa9aef251cf5547e628de8ce0bf","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"9c52d0f4-fe57-443e-9063-5d281c3c70b4"}],"resourceVersion":"9187","uid":"7e02be54-303e-4734-8a85-9a287c01c301"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:565e3659fe92dfb59b50fd56206af6cad94bcc286825b798c2cf1a98aa8d0c6f","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:53d66d524ca3e787d8dbe30dbc4d9b8612c9cebd505ccb4375a8441814e85422 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8a9e8da5c6114f062b814936d4db7a47a04d248e160d6bb28ad4e4a081496ee4 \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f5726322e050cdd4c508be51d2c99a3168eb7535ddc5f2a298df3059ea6c0071"}}config/clusteroperator/storage.json0000640000000000000000000000346615156522232016315 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"790f4605-4de5-46fe-b4c6-4ba763e1fbe0","resourceVersion":"4380","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:09Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:09Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:09Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315156522232016661 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"5fc5c3d8-784f-4ef1-bbef-3cdcbc347103","resourceVersion":"5038","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:13Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:10Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:10Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000252415156522232024663 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"c96205bc-883f-4202-a552-5f39c42bf210","resourceVersion":"8012","generation":1,"creationTimestamp":"2026-03-18T13:01:39Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:54Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:07:54Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:07:54Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:55Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515156522232023457 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"05f4206b-c375-44e2-8f24-9bf2cb89429b","resourceVersion":"10486","generation":1,"creationTimestamp":"2026-03-18T13:01:39Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:47Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:11:47Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:47Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:47Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115156522232022043 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"c75c5854-5557-4fec-a106-46e3d52eb0f3","resourceVersion":"7861","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:54Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:54Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:54Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:54Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315156522232020305 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"316cf8c5-7851-4041-ac5e-184b5268af15","resourceVersion":"819","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000426315156522232022435 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"4d377d64-51c0-4bae-9dc1-dde7776e4419","resourceVersion":"7364","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:07:11Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 5, desired generation is 6.\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:07:11Z","reason":"_NoPodsAvailable","message":"Available: no route controller manager deployment pods available on any node."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:11Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215156522232020637 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"4e957888-52b5-4291-85e5-0ae07b1e4f15","resourceVersion":"9289","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:09Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:58Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:07:11Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.40:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.40:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:09Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"openshift-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420515156522232015431 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"32a9789c-9497-4cfc-84f3-b55f44494ab7","resourceVersion":"10234","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:19Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:51Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:51Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:19Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:19Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115156522232017067 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"cbbdfb41-8b8a-41ed-b9b2-041f0bf636d2","resourceVersion":"6047","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:23Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.35\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:24Z","reason":"AsExpected","message":"Cluster version is \"4.18.35\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:22Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003615415156522232016342 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"5dc0bcff-812c-450f-bb3f-32dc7e3853c6","resourceVersion":"7499","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-18T13:05:59Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:05:47Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:05:47Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:50Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:07Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-flatfile-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715156522232017033 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"72fe82f9-b3bf-4256-b067-4d125e1d2964","resourceVersion":"7202","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:48Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:48Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:07:48Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:48Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315156522232017130 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"5108b4bf-4162-48e4-bff4-4163f76bb374","resourceVersion":"7377","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:49Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.35"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:49Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:49Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:49Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000546315156522232017517 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"616e0c53-7707-4339-b1a9-994277d13e8a","resourceVersion":"10427","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:38Z","message":"Cluster version is 4.18.35"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:38Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:38Z","reason":"AsExpected","message":"Cluster has deployed [{operator 4.18.35} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015}]"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:38Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-18T13:11:38Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-image","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"master":"all 1 nodes are at latest configuration rendered-master-483abfa9aef251cf5547e628de8ce0bf","worker":"all 0 nodes are at latest configuration rendered-worker-2616cb266eed437386123066a53e9331"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253315156522232020103 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"a911c76e-6815-4b5e-a151-30f3b9a9db8a","resourceVersion":"10506","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:47Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.35"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:47Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:47Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:47Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415156522232017020 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"532b2fb1-4af9-4c9e-8cf5-743984fc7d73","resourceVersion":"10503","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:47Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:47Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:47Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:47Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315156522232022540 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"2cd01408-63f2-410e-a6a4-abe4e5e9bc31","resourceVersion":"4957","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:13Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:13Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615156522232017550 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"acde3f80-34fa-4859-b4a1-6f1698970dec","resourceVersion":"7536","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:07:23Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:07:09Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715156522232021371 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"f86f4c6d-42b2-4248-aa86-6f69b884a343","resourceVersion":"9290","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:07:42Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:07:10Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715156522232017576 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"77e1b021-3fd5-4765-9740-4f9317c17ef1","resourceVersion":"6978","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:06:55Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:07:41Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:06:55Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:06:55Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-18T13:06:55Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000534115156522232016473 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"747aefd9-82af-4ec9-81c4-3db041fa4c04","resourceVersion":"10581","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"Unknown","lastTransitionTime":"2026-03-18T13:11:48Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"Unknown","lastTransitionTime":"2026-03-18T13:11:48Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}config/clusteroperator/ingress.json0000640000000000000000000000456715156522232016326 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"634daed6-5e38-4ff9-bac5-2eaedddba95a","resourceVersion":"6751","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:38Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:07:36Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:37Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:36Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-18T13:07:36Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715156522232017573 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"e0ca393a-8ac7-4c28-aedb-95eb391d7bad","resourceVersion":"797","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015156522232015565 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"fa8383d4-119a-4220-8a39-36b8f36896d8","resourceVersion":"6198","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:09Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:07:29Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:07:10Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:10Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:09Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515156522232015435 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"72ce6a70-8ebf-409a-bfa1-d0f24456afb2","resourceVersion":"9746","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:27Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:37Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:27Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:36Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715156522232021437 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"4b61014e-3f89-483a-b948-d50908e6ffd5","resourceVersion":"9892","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:13Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:13Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"csi-snapshot-controller","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515156522232021616 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"c57939b6-c337-486f-81c6-b6643471aab0","resourceVersion":"9863","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:29Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:29Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:29Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:29Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215156522232016277 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"d988e8ff-992a-4ab1-9712-68cc540ceee0","resourceVersion":"712","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615156522232017737 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"7e3ff4c4-bbf4-4391-8adb-d945b292a626","resourceVersion":"5217","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:15Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:15Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:15Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:15Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:15Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000266015156522232020465 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"2e3fec6e-b31b-43de-a376-19b1fa7fbc53","resourceVersion":"10504","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:47Z","reason":"AsExpected","message":"at version 4.18.35"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:47Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:47Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:47Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000001547315156522232020070 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"f470c64f-766c-45b8-b6d6-4068050518f2","resourceVersion":"10733","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:38Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:38Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:38Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:38Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-gcp-ro-creds"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440215156522232021537 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"9b3c57eb-846d-4358-8a80-5320fa539ba4","resourceVersion":"10566","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.35"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:48Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015156522232016577 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"37daa75e-753f-4dbd-bdb6-aeae860fdcd5","resourceVersion":"6491","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:36Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:36Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:36Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:36Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-18T13:07:36Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000731315156522232017663 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"b1fe9358-90ee-4839-bb6d-9179af17e644","resourceVersion":"7920","generation":1,"creationTimestamp":"2026-03-18T13:01:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:09Z","reason":"AsExpected","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.234.141:443/healthz\": dial tcp 172.30.234.141:443: connect: connection refused\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:07:52Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:07:09Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.45:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.45:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.234.141:443/healthz\": dial tcp 172.30.234.141:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:07:09Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"oauth-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/running_containers.json0000640000000000000000000001134415156522232015313 0ustar0000000000000000{"images":{"0":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","1":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","10":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","11":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","12":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","13":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","14":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","15":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","16":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","17":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","18":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","19":"sha256:0bccc03fd9ffe278e15c8f4be1db030307e4cd5020b78d711fc62f104fd6a980","2":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","20":"sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","21":"sha256:96ae39329a45e017d3444b3794dc95126641ca54fe645bb8729b3d501bd47c64","22":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","23":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","24":"sha256:97c7a635130c574a2c501091bb44f17cd92e05e29b5102e59578b5885d9bfec0","25":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","26":"sha256:cdd28dfe7132e19af9f013f72cf120d970bc31b6b74693af262f8d2e82a096e1","27":"sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","28":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","29":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","3":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","30":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","31":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","32":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","33":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","34":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","35":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","36":"sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3","37":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","38":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","39":"sha256:de91abd5ad76fb491881a75a0feb4b8ca5600ceb5e15a4b0b687ada01ea0a44c","4":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","40":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","41":"sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777","42":"sha256:f264240fe2a46d7aa95e56ee202a8403c3dad6c220cf29caff0936c82e0c086f","43":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","44":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","45":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","46":"sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","47":"sha256:82f2c59d19eb73ad5c0f93b0a63003c1885f5297959c9c45b401d1a74aea6e76","48":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","49":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","5":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","50":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","51":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","52":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","53":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","54":"sha256:9174864cd47431966d033d283bc7836e7ca579139ef85c36275db542fda80803","55":"sha256:39c122c726d1bf520dd481350fee5ad940762d5d4c9f8c012db6bf56b0ca8757","6":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","7":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","8":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","9":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9"},"containers":{"2026-03":{"0":22,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":2,"2":6,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":4,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":3,"50":1,"51":1,"52":1,"53":1,"54":1,"55":1,"6":3,"7":2,"8":2,"9":2}}}operator-controller-controller-manager-57777556ff-9bjsj.json0000640000000000000000000002473515156522232032230 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-57777556ff-9bjsj","generateName":"operator-controller-controller-manager-57777556ff-","namespace":"openshift-operator-controller","uid":"98e9b9f2-dd2b-4bb0-b2a8-5659a7f95617","resourceVersion":"9465","creationTimestamp":"2026-03-18T13:07:35Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"57777556ff"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.43/23\"],\"mac_address\":\"0a:58:0a:80:00:2b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.43/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.43\"\n ],\n \"mac\": \"0a:58:0a:80:00:2b\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-57777556ff","uid":"93e58da4-7f6d-4035-b465-e80f8b07bc0d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-fbsq9","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-fbsq9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-fbsq9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:38Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:35Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:16Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:16Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:35Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.43","podIPs":[{"ip":"10.128.0.43"}],"startTime":"2026-03-18T13:07:35Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-18T13:07:37Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://59c8efa660020136a15ef14448bc9cb0b22e7df7c1b1767ff473eca4a83bd7ff","started":true,"volumeMounts":[{"name":"kube-api-access-fbsq9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-18T13:11:07Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"roller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"b1e4620b-c7d6-48be-a337-d44ac056df60\"\nI0318 13:07:58.420955 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"69b82ed8-9a85-43ee-9e22-ff9f89b25aa0\"\nI0318 13:07:58.420997 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"69b82ed8-9a85-43ee-9e22-ff9f89b25aa0\"\nE0318 13:09:04.923391 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0318 13:10:04.927865 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0318 13:10:17.919642 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0318 13:10:17.919786 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\nI0318 13:10:17.919803 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\nI0318 13:10:17.919831 1 internal.go:542] \"Stopping and waiting for leader election runnables\"\nI0318 13:10:17.919841 1 internal.go:550] \"Stopping and waiting for caches\"\n","startedAt":"2026-03-18T13:07:37Z","finishedAt":"2026-03-18T13:10:17Z","containerID":"cri-o://e6d3b86684e16237f7515b45dbb7b40a94f5f8bddf2d34d18c36a6a4d6af41b4"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","containerID":"cri-o://373a96948933142905a0929fac3fe9686db40a54b4edff77be09a9cdf58a235d","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-fbsq9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-7bd846bfc4-gxxbr.json0000640000000000000000000002514215156522232025635 0ustar0000000000000000{"metadata":{"name":"network-operator-7bd846bfc4-gxxbr","generateName":"network-operator-7bd846bfc4-","namespace":"openshift-network-operator","uid":"f7f4ae93-428b-4ebd-bfaa-18359b407ede","resourceVersion":"9415","creationTimestamp":"2026-03-18T13:05:34Z","labels":{"name":"network-operator","pod-template-hash":"7bd846bfc4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7bd846bfc4","uid":"e106ab5c-836b-4d2d-9e4e-01e6e6ad93c6","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-mc8t5","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:02f0aa65dfd2a58e13248b4e2078caec450fa2bdbacb3afeb34d1de30c909b0f"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:896642a5bdda0cdbeccb0293d3de85f8882ac72678df8d12fb501fd3367982af"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b6140aa21678d5652c4d09e21eab5dfad35af30902b705c70f72a384e43868ac"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da26695a0ab94eddc0841bf2ed51b30921e2cdc2a9a5acd0d951081de67f1a97"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a22978e1669cdbaeee6ec0800f83559b56a2344f1c003f8cd60f27fac939680e"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-mc8t5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:05:47Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:05:41Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:05:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T13:05:41Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-18T13:11:06Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"nshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0318 13:08:32.253011 1 log.go:245] reconciling (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter\nI0318 13:08:32.253455 1 log.go:245] could not apply (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: failed to apply / update (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0318 13:08:32.253504 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter\nI0318 13:08:32.253679 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0318 13:08:32.253729 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script\nI0318 13:08:32.253881 1 log.go:245] could not apply (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: failed to apply / update (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: client rate limiter Wait returned an error: context canceled\nI0318 13:08:32.253920 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter\nI0318 13:08:32.254140 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0318 13:08:37.240220 1 observer_polling.go:162] Shutting down file observer\nF0318 13:09:02.242490 1 operator.go:133] Failed to start controller-runtime manager: failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\n","startedAt":"2026-03-18T13:05:46Z","finishedAt":"2026-03-18T13:09:02Z","containerID":"cri-o://0f68e5c45ea6d8fc8605559b1dd3501571f6348a64337151b3b9a1c54518d47c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","containerID":"cri-o://12f0bb461bc477b8eb65dc72156ed9ad8f7e41968ae2d0ef9cad32f3e837b199","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-mc8t5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-x8r78.json0000640000000000000000000002463315156522232025576 0ustar0000000000000000{"metadata":{"name":"network-node-identity-x8r78","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"0e7156cf-2d68-4de8-b7e7-60e1539590dd","resourceVersion":"9419","creationTimestamp":"2026-03-18T13:06:20Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"5d8cf8bd5d","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"eee99bf5-b650-4633-9911-812b514352b7","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-z84cq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-z84cq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-z84cq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:35Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T13:06:21Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-18T13:11:06Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"h72z\"} reason=\"CSRApproved\"\nI0318 13:06:39.031197 1 approver.go:230] Finished syncing CSR csr-7h72z for master-0 node in 940.932156ms\nI0318 13:06:39.434068 1 approver.go:230] Finished syncing CSR csr-7h72z for unknown node in 88.402µs\nI0318 13:06:39.783551 1 approver.go:230] Finished syncing CSR csr-7h72z for unknown node in 81.332µs\nI0318 13:06:50.966249 1 recorder.go:104] \"CSR \\\"csr-555rn\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-555rn\"} reason=\"CSRApproved\"\nI0318 13:06:50.973385 1 approver.go:230] Finished syncing CSR csr-555rn for master-0 node in 7.386695ms\nI0318 13:06:50.973628 1 approver.go:230] Finished syncing CSR csr-555rn for unknown node in 107.042µs\nI0318 13:06:50.983039 1 approver.go:230] Finished syncing CSR csr-555rn for unknown node in 98.402µs\nE0318 13:08:30.006704 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0318 13:08:45.006635 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0318 13:08:45.006701 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0318 13:09:00.007842 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0318 13:09:00.008287 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-03-18T13:06:34Z","finishedAt":"2026-03-18T13:09:00Z","containerID":"cri-o://4a2b96ab3e758ccd953d067f7229799e7c3da85d90ceb61612bf33b3cfdeebe2"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://0df05b30952e8bace8c1fadfea54a4900c846053f046ccb0bcbeb970b3b63e09","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-z84cq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-18T13:06:34Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://3e2abd83cb78987bc1cea9ff0bde57ccd8d857515f5058285b44c75df988a5ac","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-z84cq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215156522232026255 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"77746137-5deb-4e35-9bb5-3aa114ad6de1","resourceVersion":"4033","creationTimestamp":"2026-03-18T13:05:51Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.mirror":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.seen":"2026-03-18T13:04:59.659918811Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c638b1e6-897b-4df5-a4b7-de9264d6b4f8","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:05Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:05Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:05Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:05Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T13:07:05Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:05:03Z","finishedAt":"2026-03-18T13:05:03Z","containerID":"cri-o://1eb12a87dc862d5b3d8d0f8d6df8c24ebffab83c33817eb9807a92d04594145f"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://1eb12a87dc862d5b3d8d0f8d6df8c24ebffab83c33817eb9807a92d04594145f","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-18T13:05:52Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0318 13:05:22.035309 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0318 13:05:22.035514 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0318 13:05:22.036706 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-18T13:05:21Z","finishedAt":"2026-03-18T13:05:22Z","containerID":"cri-o://4d4a6fb4b82b14518b178f0f032fb16b2ce281c0de8e87c9f0449d46d7739b5b"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://c6b7be01dc24d7f26b3d57447fbf2490a6f4dfb2fb1c9fdf65bee4f74420bdb3","started":true}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/cluster-baremetal-operator-6f69995874-mz4qp.json0000640000000000000000000002437415156522232026066 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-operator-6f69995874-mz4qp","generateName":"cluster-baremetal-operator-6f69995874-","namespace":"openshift-machine-api","uid":"ac6d8eb6-1d5e-4757-9823-5ffe478c711c","resourceVersion":"9412","creationTimestamp":"2026-03-18T13:05:34Z","labels":{"k8s-app":"cluster-baremetal-operator","pod-template-hash":"6f69995874"},"annotations":{"capability.openshift.io/name":"baremetal","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-baremetal-operator-6f69995874","uid":"5562239f-2da0-403e-aff0-2dfba251013a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cert","secret":{"secretName":"cluster-baremetal-webhook-server-cert","defaultMode":420}},{"name":"config","configMap":{"name":"baremetal-kube-rbac-proxy","defaultMode":420}},{"name":"cluster-baremetal-operator-tls","secret":{"secretName":"cluster-baremetal-operator-tls","defaultMode":420}},{"name":"images","configMap":{"name":"cluster-baremetal-operator-images","defaultMode":420}},{"name":"kube-api-access-zlzqd","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-baremetal-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","command":["/usr/bin/cluster-baremetal-operator"],"args":["--enable-leader-election"],"ports":[{"name":"webhook-server","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"METRICS_PORT","value":"8080"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"cert","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/tls"},{"name":"images","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/images"},{"name":"kube-api-access-zlzqd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}},{"name":"baremetal-kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://localhost:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--config-file=/etc/baremetal-kube-rbac-proxy/config-file.yaml","--logtostderr=true","--v=10"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-zlzqd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-baremetal-operator","serviceAccount":"cluster-baremetal-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c9"},"runAsUser":65534,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2026-03-18T13:06:52Z","containerStatuses":[{"name":"baremetal-kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-18T13:07:36Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://3cfbaa8df9a218f8dee119016e4288585bf40d98d2be646b4c356cf8d4a6af1b","started":true,"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-zlzqd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"cluster-baremetal-operator","state":{"running":{"startedAt":"2026-03-18T13:11:06Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1.DaemonSet\"\nI0318 13:07:36.522505 1 controller.go:173] \"msg\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1.ClusterOperator\"\nI0318 13:07:36.522515 1 controller.go:173] \"msg\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1.Proxy\"\nI0318 13:07:36.522526 1 controller.go:173] \"msg\"=\"Starting EventSource\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"source\"=\"kind source: *v1beta1.Machine\"\nI0318 13:07:36.522534 1 controller.go:181] \"msg\"=\"Starting Controller\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\"\nI0318 13:07:36.746794 1 controller.go:215] \"msg\"=\"Starting workers\" \"controller\"=\"provisioning\" \"controllerGroup\"=\"metal3.io\" \"controllerKind\"=\"Provisioning\" \"worker count\"=1\nE0318 13:09:03.401152 1 leaderelection.go:340] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0318 13:10:03.405599 1 leaderelection.go:347] error retrieving resource lock openshift-machine-api/cluster-baremetal-operator: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-baremetal-operator)\nI0318 13:10:16.394135 1 leaderelection.go:285] failed to renew lease openshift-machine-api/cluster-baremetal-operator: timed out waiting for the condition\nE0318 13:10:50.402812 1 leaderelection.go:308] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nE0318 13:10:50.402893 1 main.go:182] \"problem running manager\" err=\"leader election lost\"\n","startedAt":"2026-03-18T13:07:36Z","finishedAt":"2026-03-18T13:10:50Z","containerID":"cri-o://49667c3562724d21d11f45af9648468c2dd5436306c9e389954957510ee7b256"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","containerID":"cri-o://acf7b4bcf62e14560e517d9dee729cb0a4ed47ca5e163fdf0d69e59c5b3307d6","started":true,"volumeMounts":[{"name":"cert","mountPath":"/etc/cluster-baremetal-operator/tls","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"images","mountPath":"/etc/cluster-baremetal-operator/images","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-zlzqd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-66b84d69b-wqxpk.json0000640000000000000000000002440315156522232025377 0ustar0000000000000000{"metadata":{"name":"ingress-operator-66b84d69b-wqxpk","generateName":"ingress-operator-66b84d69b-","namespace":"openshift-ingress-operator","uid":"d9d09a56-ed4c-40b7-8be1-f3934c07296e","resourceVersion":"9407","creationTimestamp":"2026-03-18T13:05:34Z","labels":{"name":"ingress-operator","pod-template-hash":"66b84d69b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-66b84d69b","uid":"a71ea77a-2017-482b-9f9a-2d7071347764","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-wmzr4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-wmzr4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-wmzr4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-03-18T13:06:52Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-18T13:11:06Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"error\t{\"controller\": \"route_metrics_controller\", \"object\": {\"name\":\"default\",\"namespace\":\"openshift-ingress-operator\"}, \"namespace\": \"openshift-ingress-operator\", \"name\": \"default\", \"reconcileID\": \"61e537b1-7e36-41df-90ee-06243fb11043\", \"error\": \"failed to get Ingress Controller \\\"openshift-ingress-operator/default\\\": Timeout: failed waiting for *v1.IngressController Informer to sync\"}\n2026-03-18T13:09:36.662Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"route_metrics_controller\"}\n2026-03-18T13:10:06.657Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for caches\n2026-03-18T13:10:06.658Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2026-03-18T13:10:06.659Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\n2026-03-18T13:10:06.659Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\nW0318 13:10:06.659135 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Event ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-18T13:10:06.659Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-03-18T13:10:06.662Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n2026-03-18T13:10:06.662Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"[failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route, failed waiting for all runnables to end within grace period of 30s: context deadline exceeded]\", \"errorCauses\": [{\"error\": \"failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}, {\"error\": \"failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\"}]}\n","startedAt":"2026-03-18T13:07:35Z","finishedAt":"2026-03-18T13:10:06Z","containerID":"cri-o://a09e30a0e0a70728f4eacd16714f41244f1eaa2c744901296ee7506c0e6ed81f"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","containerID":"cri-o://df5d711a967c436c3ef89b97c0b604c819b293d8a09e8223cc8050c145294e10","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-wmzr4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-18T13:07:36Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://dd510699ed24732f88c9dd87f0f6af2740999700a9b342734a145bb0ab91ee55","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-wmzr4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-64854d9cff-qsnxz.json0000640000000000000000000001670215156522232030525 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-64854d9cff-qsnxz","generateName":"csi-snapshot-controller-64854d9cff-","namespace":"openshift-cluster-storage-operator","uid":"deb67ea0-8342-40cb-b0f4-115270e878dd","resourceVersion":"9416","creationTimestamp":"2026-03-18T13:07:08Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"64854d9cff"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.30/23\"],\"mac_address\":\"0a:58:0a:80:00:1e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.30/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.30\"\n ],\n \"mac\": \"0a:58:0a:80:00:1e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-64854d9cff","uid":"8013d951-a06b-4cbb-9baf-86637b936384","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-62lvq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-62lvq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000160000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c2"},"runAsNonRoot":true,"fsGroup":1000160000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:13Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:07Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.30","podIPs":[{"ip":"10.128.0.30"}],"startTime":"2026-03-18T13:07:08Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-03-18T13:11:06Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ler-leader\nI0318 13:07:13.075040 1 leader_election.go:184] \"became leader, starting\"\nI0318 13:07:13.075398 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0318 13:07:13.075447 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0318 13:07:13.077741 1 snapshot_controller_base.go:255] Starting snapshot controller\nI0318 13:07:13.078885 1 reflector.go:368] Caches populated for *v1.VolumeSnapshot from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0318 13:07:13.079623 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160\nI0318 13:07:13.081030 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotClass from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0318 13:07:13.081097 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160\nI0318 13:07:13.081137 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotContent from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nE0318 13:09:07.669468 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0318 13:10:07.672913 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-storage-operator/snapshot-controller-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io snapshot-controller-leader)\nI0318 13:10:20.671538 1 leaderelection.go:297] failed to renew lease openshift-cluster-storage-operator/snapshot-controller-leader: timed out waiting for the condition\nE0318 13:10:20.671616 1 leader_election.go:188] \"Stopped leading\"\n","startedAt":"2026-03-18T13:07:12Z","finishedAt":"2026-03-18T13:10:20Z","containerID":"cri-o://8c9e4d7f5a1cfb905af9530af8305e93c12f5088f9374b32f042b05f77b48591"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","containerID":"cri-o://f15ee5d33285c15f95f38e99b3afffed56d23dec0f3da62015e493b81d27528c","started":true,"volumeMounts":[{"name":"kube-api-access-62lvq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-bppd4.json0000640000000000000000000002541315156522232026637 0ustar0000000000000000{"metadata":{"name":"cluster-olm-operator-67dcd4998-bppd4","generateName":"cluster-olm-operator-67dcd4998-","namespace":"openshift-cluster-olm-operator","uid":"902909ca-ab08-49aa-9736-70e073f8e67d","resourceVersion":"5609","creationTimestamp":"2026-03-18T13:05:35Z","labels":{"name":"cluster-olm-operator","pod-template-hash":"67dcd4998"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.20/23\"],\"mac_address\":\"0a:58:0a:80:00:14\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.20/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.20\"\n ],\n \"mac\": \"0a:58:0a:80:00:14\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-olm-operator-67dcd4998","uid":"6ea40091-d201-4039-80ae-dda6ed52e5a0","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cluster-olm-operator-serving-cert","secret":{"secretName":"cluster-olm-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"operand-assets","emptyDir":{}},{"name":"kube-api-access-kskqr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"copy-catalogd-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/catalogd"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-kskqr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000370000,"allowPrivilegeEscalation":false}},{"name":"copy-operator-controller-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/operator-controller"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-kskqr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000370000,"allowPrivilegeEscalation":false}}],"containers":[{"name":"cluster-olm-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","command":["/cluster-olm-operator"],"args":["start"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"OPERATOR_NAME","value":"cluster-olm-operator"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"CATALOGD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85"},{"name":"OPERATOR_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-kskqr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000370000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-olm-operator","serviceAccount":"cluster-olm-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c19,c14"},"runAsNonRoot":true,"fsGroup":1000370000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:13Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:52Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.20","podIPs":[{"ip":"10.128.0.20"}],"startTime":"2026-03-18T13:06:52Z","initContainerStatuses":[{"name":"copy-catalogd-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:07:07Z","finishedAt":"2026-03-18T13:07:07Z","containerID":"cri-o://0697c4988a8dce166398ff970c57c5e68178bc04fae2f2829aa0dffd05961950"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","containerID":"cri-o://0697c4988a8dce166398ff970c57c5e68178bc04fae2f2829aa0dffd05961950","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-kskqr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"copy-operator-controller-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:07:12Z","finishedAt":"2026-03-18T13:07:12Z","containerID":"cri-o://a4c090aab4f3bf89ced608a71e5db3af3d21ed7b2100020f019a5440d122cecc"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","containerID":"cri-o://a4c090aab4f3bf89ced608a71e5db3af3d21ed7b2100020f019a5440d122cecc","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-kskqr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"cluster-olm-operator","state":{"running":{"startedAt":"2026-03-18T13:07:18Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0318 13:07:17.513965 1 cmd.go:254] Using insecure, self-signed certificates\nI0318 13:07:18.147611 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 13:07:18.148092 1 observer_polling.go:159] Starting file observer\nI0318 13:07:18.148280 1 observer_polling.go:120] Observed file \"/var/run/secrets/serving-cert/tls.crt\" has been modified (old=\"\", new=\"69a3c70aa53c1f0cd5d3bd087041de0b08279bb0dee313c6e5627eb9b328e092\")\nW0318 13:07:18.148315 1 builder.go:154] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was modified\nI0318 13:07:18.148467 1 observer_polling.go:120] Observed file \"/var/run/secrets/serving-cert/tls.key\" has been modified (old=\"\", new=\"0a68a8254cd58acf36a5183e0961169c312dfab842331c308bc6f71b2f9e37a5\")\nW0318 13:07:18.148499 1 builder.go:266] unable to get owner reference (falling back to namespace): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-cluster-olm-operator/pods\": context canceled\nI0318 13:07:18.148604 1 builder.go:298] cluster-olm-operator version 4.18.0-202602261953.p2.g88088e4.assembly.stream.el9-88088e4-88088e4bfe9f55ea7ab2c4331cebee727c8c0c34\nF0318 13:07:18.433493 1 cmd.go:179] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled\n","startedAt":"2026-03-18T13:07:17Z","finishedAt":"2026-03-18T13:07:18Z","containerID":"cri-o://cc3f7f9178a5ebacbbfda5fb5509e6451e88862baa49b921cb87ec5d6cc82ee7"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","containerID":"cri-o://55c94bf30a1ccca039ed50a5bce5510c09848033cc6f053a453f757341dfc8bc","started":true,"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-kskqr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-6864dc98f7-q2ndb.json0000640000000000000000000002537715156522232025663 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-6864dc98f7-q2ndb","generateName":"catalogd-controller-manager-6864dc98f7-","namespace":"openshift-catalogd","uid":"16f8e725-f18a-478e-88c5-87d54aeb4857","resourceVersion":"9464","creationTimestamp":"2026-03-18T13:07:35Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"6864dc98f7"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.44/23\"],\"mac_address\":\"0a:58:0a:80:00:2c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.44/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.44\"\n ],\n \"mac\": \"0a:58:0a:80:00:2c\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-6864dc98f7","uid":"f87743af-b0e4-4e49-9ce6-45e7b0ed8cc0","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-8hvsl","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-8hvsl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-8hvsl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:38Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:35Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:16Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:11:16Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:35Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.44","podIPs":[{"ip":"10.128.0.44"}],"startTime":"2026-03-18T13:07:35Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-18T13:07:37Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://eefde7657bd37afb4c9f371b147972b63886e6cf2d4cda43e0d1e78de918e266","started":true,"volumeMounts":[{"name":"kube-api-access-8hvsl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-18T13:11:06Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"tplace\" reconcileID=\"53222207-87bb-47e9-9421-b0c55868d0c8\" layer=0\nI0318 13:09:42.588353 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"53222207-87bb-47e9-9421-b0c55868d0c8\" layer=1\nI0318 13:09:42.777157 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"53222207-87bb-47e9-9421-b0c55868d0c8\" layer=2\nI0318 13:09:45.132294 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"53222207-87bb-47e9-9421-b0c55868d0c8\" layer=3\nI0318 13:09:46.305957 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"53222207-87bb-47e9-9421-b0c55868d0c8\" layer=4\nE0318 13:10:04.920712 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0318 13:10:17.909145 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0318 13:10:17.909375 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-18T13:07:37Z","finishedAt":"2026-03-18T13:10:17Z","containerID":"cri-o://aebb870640af737294de5fde7faf1b19862e6f81b4ae715f35fdf208373b75e7"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","containerID":"cri-o://8b95eb8fc69ceaf4692d8f4970690d7b9c31eb8fb64b767afa33cfaa9ea6e088","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-8hvsl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515156522232023220 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115156522232025430 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715156522232025137 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715156522232025130 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315156522232022250 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515156522232026704 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115156522232023407 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115156522232023203 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115156522232025473 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- aggregated/ingress_controllers_certs.json0000640000000000000000000000045715156522232017536 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-18T13:07:36Z","not_after":"2028-03-17T13:07:37Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-18T13:07:37Z","not_after":"2028-03-17T13:07:38Z","controllers":[]}]cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002231415156522232025477 0ustar0000000000000000{"metadata":{"name":"edit","uid":"34db967e-efca-4cfd-b30e-1e8dd62e232d","resourceVersion":"10005","creationTimestamp":"2026-03-18T13:00:12Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002520115156522232025640 0ustar0000000000000000{"metadata":{"name":"admin","uid":"cadc0647-6484-451b-913c-b96a14389902","resourceVersion":"10011","creationTimestamp":"2026-03-18T13:00:12Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/pod/openshift-cluster-version/cluster-version-operator-7d58488df-bqmqw.json0000640000000000000000000001341415156522232026716 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-7d58488df-bqmqw","generateName":"cluster-version-operator-7d58488df-","namespace":"openshift-cluster-version","uid":"8ffe2e75-9cc3-4244-95c8-800463c5aa28","resourceVersion":"8369","creationTimestamp":"2026-03-18T13:07:54Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"7d58488df"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-7d58488df","uid":"d73a10ce-b9d5-4a95-a866-1be9b988ed42","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:55Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:55Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:55Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T13:07:54Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-18T13:07:55Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","containerID":"cri-o://6c8e2099733ce74e4ed7853f255ed961973595eaee20fcbedbc997cee28f6bf1","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415156522232011025 0ustar000000000000000035acfc3d-9aee-48e4-ad13-13358d88a8f2config/version.json0000640000000000000000000000724015156522232013073 0ustar0000000000000000{"metadata":{"name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","resourceVersion":"10421","generation":2,"creationTimestamp":"2026-03-18T13:01:11Z"},"spec":{"clusterID":"35acfc3d-9aee-48e4-ad13-13358d88a8f2","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","url":"https://access.redhat.com/errata/RHSA-2026:3905","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-18T13:01:38Z","completionTime":null,"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","verified":false}],"observedGeneration":2,"versionHash":"Uw6h6T7stl0=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-18T13:01:38Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-18T13:01:38Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-18T13:01:38Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-18T13:01:38Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:01:38Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-18T13:11:44Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, cloud-controller-manager, cloud-credential, cluster-autoscaler, control-plane-machine-set, dns, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, machine-config, monitoring, openshift-apiserver, openshift-controller-manager, openshift-samples, operator-lifecycle-manager-catalog are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): the server is down or not responding\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): the server is down or not responding"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:01:38Z","reason":"MultipleErrors","message":"Unable to apply 4.18.35: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/oauth.json0000640000000000000000000000114415156522232012523 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"e09b1e1e-3a2a-42ac-90c0-50956ec1e267","resourceVersion":"1697","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315156522232023445 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"e9195370-a89c-4029-b944-855123b2ab13","resourceVersion":"4230","generation":1,"creationTimestamp":"2026-03-18T13:07:08Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015156522232022050 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"d337a1d0-b8f5-4c12-be68-88257de1b553","resourceVersion":"4157","generation":1,"creationTimestamp":"2026-03-18T13:07:08Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-18T13:07:08Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115156522232027751 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5bd64e07-afcb-4006-9f7e-71b90dbebf73","resourceVersion":"6568","generation":1,"creationTimestamp":"2026-03-18T13:07:36Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:07:36Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-18T13:07:36Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-18T13:07:36Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:07:36Z","reason":"AsExpected"}]}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215156522232020177 0ustar0000000000000000[]config/authentication.json0000640000000000000000000000116515156522232014425 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"b45287d8-0fc6-4f7d-9272-62bb67cd094c","resourceVersion":"1162","generation":1,"creationTimestamp":"2026-03-18T13:01:47Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/machineconfigpools/worker.json0000640000000000000000000001013415156522232016562 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-18T13:07:39Z","generation":4,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"9434","uid":"f20187eb-6082-43bc-b9ee-6a6470a6520e"},"spec":{"configuration":{"name":"rendered-worker-2616cb266eed437386123066a53e9331","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-15T12:50:06Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-19T12:57:20Z","subject":"CN=kube-csr-signer_@1773839231"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-19T12:57:20Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-18T12:57:20Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-18T12:57:20Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-15T12:57:18Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-18T13:06:54Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1773839214"}],"conditions":[{"lastTransitionTime":"2026-03-18T13:08:07Z","message":"All nodes are updated with MachineConfig rendered-worker-2616cb266eed437386123066a53e9331","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-18T13:08:07Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-18T13:08:07Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-18T13:08:07Z","message":"","reason":"","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-18T13:11:09Z","message":"","reason":"","status":"False","type":"RenderDegraded"}],"configuration":{"name":"rendered-worker-2616cb266eed437386123066a53e9331","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":4,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000001240715156522232016551 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-18T13:07:39Z","generation":3,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"9432","uid":"9c52d0f4-fe57-443e-9063-5d281c3c70b4"},"spec":{"configuration":{"name":"rendered-master-483abfa9aef251cf5547e628de8ce0bf","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-15T12:50:06Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-19T12:57:20Z","subject":"CN=kube-csr-signer_@1773839231"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-03-19T12:57:20Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-18T12:57:20Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-18T12:57:20Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-03-15T12:57:18Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-03-18T13:06:54Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1773839214"}],"conditions":[{"lastTransitionTime":"2026-03-18T13:08:00Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-03-18T13:11:02Z","message":"All nodes are updated with MachineConfig rendered-master-483abfa9aef251cf5547e628de8ce0bf","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-03-18T13:11:02Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-03-18T13:11:02Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-03-18T13:11:02Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-master-483abfa9aef251cf5547e628de8ce0bf","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"degradedMachineCount":0,"machineCount":1,"observedGeneration":3,"readyMachineCount":1,"unavailableMachineCount":0,"updatedMachineCount":1}}config/apiserver.json0000640000000000000000000000121615156522232013403 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"8fe78996-ca15-44ac-bc88-9a2e2de3ee3d","resourceVersion":"920","generation":1,"creationTimestamp":"2026-03-18T13:01:41Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/node/master-0.json0000640000000000000000000000676315156522232013774 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"c638b1e6-897b-4df5-a4b7-de9264d6b4f8","resourceVersion":"10695","creationTimestamp":"2026-03-18T13:05:33Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-483abfa9aef251cf5547e628de8ce0bf","machineconfiguration.openshift.io/desiredConfig":"rendered-master-483abfa9aef251cf5547e628de8ce0bf","machineconfiguration.openshift.io/desiredDrain":"uncordon-rendered-master-483abfa9aef251cf5547e628de8ce0bf","machineconfiguration.openshift.io/lastAppliedDrain":"uncordon-rendered-master-483abfa9aef251cf5547e628de8ce0bf","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"10189","machineconfiguration.openshift.io/reason":"","machineconfiguration.openshift.io/state":"Done","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865360Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714384Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-18T13:11:51Z","lastTransitionTime":"2026-03-18T13:05:33Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-18T13:11:51Z","lastTransitionTime":"2026-03-18T13:05:33Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-18T13:11:51Z","lastTransitionTime":"2026-03-18T13:05:33Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-18T13:11:51Z","lastTransitionTime":"2026-03-18T13:06:52Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.113.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202603021444-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"runc","features":{"recursiveReadOnlyMounts":true}},{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}}]}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615156522232027501 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"abc9a4fe-2ad2-488e-82b2-efc41c809765","resourceVersion":"6041","generation":2,"creationTimestamp":"2026-03-18T13:07:24Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/schedulers/cluster.json0000640000000000000000000000052415156522232015226 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"13ef159d-b971-4484-90e3-5f7410521370","resourceVersion":"567","generation":1,"creationTimestamp":"2026-03-18T13:01:08Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173515156522232025123 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"1c7e3408-48a1-437d-a68c-5275678ca367","resourceVersion":"9547","generation":1,"creationTimestamp":"2026-03-18T13:01:56Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-18T13:11:26Z","reason":"SufficientPods","message":""}]}}config/proxy.json0000640000000000000000000000031315156522232012561 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"b8a31644-e4a8-4e46-bad4-8e12ce21484a","resourceVersion":"559","generation":1,"creationTimestamp":"2026-03-18T13:01:07Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/network.json0000640000000000000000000000117015156522232013073 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"b98a924a-317d-41bb-a9c1-dc97c6ba2d27","resourceVersion":"3295","generation":2,"creationTimestamp":"2026-03-18T13:01:07Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/validatingwebhookconfigurations/prometheusrules.openshift.io.json0000640000000000000000000000511415156522232025732 0ustar0000000000000000{"metadata":{"name":"prometheusrules.openshift.io","uid":"b0dd4512-61d9-445f-815b-05e7c62c485d","resourceVersion":"9713","generation":2,"creationTimestamp":"2026-03-18T13:11:27Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"prometheusrules.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-prometheusrules/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"resources":["prometheusrules"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115156522232025277 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"428ba131-ceb4-4813-a6bb-118475058163","resourceVersion":"4977","generation":2,"creationTimestamp":"2026-03-18T13:02:05Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515156522232026736 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"6cbb28fe-7d3e-469e-8be5-f5a4ed2aa703","resourceVersion":"7172","generation":1,"creationTimestamp":"2026-03-18T13:07:48Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f11eff2e-4873-489e-8c90-90d74ea87da7","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715156522232024024 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"613c6f86-ccfe-4434-a540-211fc37df9b1","resourceVersion":"4978","generation":2,"creationTimestamp":"2026-03-18T13:06:02Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"f11eff2e-4873-489e-8c90-90d74ea87da7","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537315156522232030637 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"22db1c44-8b0c-4f66-a344-a5132c4f3ff6","resourceVersion":"10588","generation":2,"creationTimestamp":"2026-03-18T13:11:48Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115156522232032107 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"ca9945cf-3f32-4ce4-ab89-5d7a5ace4aaa","resourceVersion":"6493","generation":2,"creationTimestamp":"2026-03-18T13:07:36Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715156522232024775 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"c5e559ce-62e7-427b-b342-bdc2e3674a2b","resourceVersion":"10482","generation":2,"creationTimestamp":"2026-03-18T13:11:47Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io.json0000640000000000000000000000514215156522232026500 0ustar0000000000000000{"metadata":{"name":"alertmanagerconfigs.openshift.io","uid":"669be0ac-99ed-4665-b347-630ea3b5f857","resourceVersion":"9718","generation":2,"creationTimestamp":"2026-03-18T13:11:27Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"alertmanagerconfigs.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-alertmanagerconfigs/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/infrastructure.json0000640000000000000000000000106515156522232014465 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5144fa1f-6539-444f-a02d-5824e99f0896","resourceVersion":"542","generation":1,"creationTimestamp":"2026-03-18T13:01:05Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}events/openshift-machine-api.json0000640000000000000000000000352715156522232015621 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:02:12Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-6f69995874-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:05:33Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-6f69995874-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:05:34Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:07:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:07:00Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:07:14Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:07:14Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"}]}config/ingress.json0000640000000000000000000000043615156522232013060 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"cf8dd2bc-6905-4875-aebb-21051657a81c","resourceVersion":"555","generation":1,"creationTimestamp":"2026-03-18T13:01:06Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/featuregate.json0000640000000000000000000000613615156522232013705 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d9030571-8d5b-4ee6-a41c-43e65162b9f3","resourceVersion":"648","generation":1,"creationTimestamp":"2026-03-18T13:01:27Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.35","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/image.json0000640000000000000000000000111715156522232012465 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"565d5c9e-c9e7-40b8-a92c-a89f78eb3e6e","resourceVersion":"1627","generation":1,"creationTimestamp":"2026-03-18T13:01:56Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"e613e332-5a0f-4df1-8f9b-1d3259eaac8c"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}