--- apiVersion: apps/v1 items: - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "2" operator.openshift.io/spec-hash: 408a00bf32016e6677b3eba1d94e123c6cb29455a2584076fee6faf370c3bfac release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-18T13:07:10Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 59dbf97cf8 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"5d05461a-cf9d-4179-bad1-2600fad47c42"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-18T13:07:11Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-18T13:07:11Z" name: controller-manager-59dbf97cf8 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 5d05461a-cf9d-4179-bad1-2600fad47c42 resourceVersion: "4776" uid: 7be5009f-2899-4406-a0f6-e371fedd0a74 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 59dbf97cf8 template: metadata: annotations: configmaps/client-ca: "0" configmaps/config: "4553" configmaps/openshift-global-ca: "4556" configmaps/openshift-service-ca: "4555" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 59dbf97cf8 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "8" operator.openshift.io/spec-hash: f017dfb89ee699f83dd65af4a6272eaf50bfabe7ac927ff3e5d1bd8e264b0c39 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-18T13:25:31Z" generation: 2 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 5f77b8654b managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"5d05461a-cf9d-4179-bad1-2600fad47c42"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-18T13:25:31Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:availableReplicas: {} f:fullyLabeledReplicas: {} f:observedGeneration: {} f:readyReplicas: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-18T13:27:20Z" name: controller-manager-5f77b8654b namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 5d05461a-cf9d-4179-bad1-2600fad47c42 resourceVersion: "16508" uid: d3a40f4a-2ba6-4026-8f4a-645519cb8d6a spec: replicas: 1 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 5f77b8654b template: metadata: annotations: configmaps/client-ca: "7242" configmaps/config: "15792" configmaps/openshift-global-ca: "4562" configmaps/openshift-service-ca: "5374" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "3" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 5f77b8654b name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: availableReplicas: 1 fullyLabeledReplicas: 1 observedGeneration: 2 readyReplicas: 1 replicas: 1 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "4" operator.openshift.io/spec-hash: ae2a89fd404548499daf9fa9c86f081ae40ae9507d6825ed6f90c72553839293 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-18T13:07:13Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 65c549646c managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"5d05461a-cf9d-4179-bad1-2600fad47c42"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-18T13:07:35Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-18T13:07:35Z" name: controller-manager-65c549646c namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 5d05461a-cf9d-4179-bad1-2600fad47c42 resourceVersion: "6437" uid: 61bd4b79-b329-4653-b496-6b7719974b2d spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 65c549646c template: metadata: annotations: configmaps/client-ca: "4941" configmaps/config: "4760" configmaps/openshift-global-ca: "4562" configmaps/openshift-service-ca: "4555" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 65c549646c name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "5" operator.openshift.io/spec-hash: c3c318be0de2f893895f842d4eb925caae4950818fdd9a2fab0a3373812ccdca release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-18T13:07:35Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 774f95d4b8 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"5d05461a-cf9d-4179-bad1-2600fad47c42"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-18T13:07:49Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-18T13:07:49Z" name: controller-manager-774f95d4b8 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 5d05461a-cf9d-4179-bad1-2600fad47c42 resourceVersion: "7308" uid: fceb4a80-a0b4-4e87-946c-fabf3bfb8140 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 774f95d4b8 template: metadata: annotations: configmaps/client-ca: "4941" configmaps/config: "6253" configmaps/openshift-global-ca: "4562" configmaps/openshift-service-ca: "5374" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 774f95d4b8 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "3" operator.openshift.io/spec-hash: 5d331f389464d8ba0a2d1709b909f3f8acfdc727da823fd22dd8c19ee8c11532 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-18T13:07:11Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 7fdd9495d7 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"5d05461a-cf9d-4179-bad1-2600fad47c42"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-18T13:07:13Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-18T13:07:13Z" name: controller-manager-7fdd9495d7 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 5d05461a-cf9d-4179-bad1-2600fad47c42 resourceVersion: "5018" uid: 43c8f55a-3e35-462e-902d-3242a34a8ea9 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 7fdd9495d7 template: metadata: annotations: configmaps/client-ca: "0" configmaps/config: "4760" configmaps/openshift-global-ca: "4562" configmaps/openshift-service-ca: "4555" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 7fdd9495d7 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "7" operator.openshift.io/spec-hash: 9621df404cb0248a91abf58899e4507368cd4841c0a0ccf85f2e410e42734bf9 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-18T13:15:56Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: d7c95db55 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"5d05461a-cf9d-4179-bad1-2600fad47c42"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-18T13:25:31Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-18T13:25:32Z" name: controller-manager-d7c95db55 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 5d05461a-cf9d-4179-bad1-2600fad47c42 resourceVersion: "15858" uid: ce789580-511f-4e44-b680-15e9ba3c6c15 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: d7c95db55 template: metadata: annotations: configmaps/client-ca: "7242" configmaps/config: "11646" configmaps/openshift-global-ca: "4562" configmaps/openshift-service-ca: "5374" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: d7c95db55 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "1" operator.openshift.io/spec-hash: eb74a140facf31321ed8c3241c4770fc72894dada953d6cb980d488a3008ff0b release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-18T13:07:08Z" generation: 2 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: f5df8899c managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"5d05461a-cf9d-4179-bad1-2600fad47c42"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-18T13:07:10Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-18T13:07:10Z" name: controller-manager-f5df8899c namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 5d05461a-cf9d-4179-bad1-2600fad47c42 resourceVersion: "4593" uid: 2ccfff39-f067-4d1c-90d4-fb8cb95591fb spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: f5df8899c template: metadata: annotations: configmaps/client-ca: "0" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "1" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: f5df8899c name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 2 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "6" operator.openshift.io/spec-hash: ce5e494ba66832f11755b793405b131ee92c650a2542dd12578058014e634901 release.openshift.io/version: 4.18.35 creationTimestamp: "2026-03-18T13:07:48Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: fffb75699 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"5d05461a-cf9d-4179-bad1-2600fad47c42"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-03-18T13:15:56Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-03-18T13:15:56Z" name: controller-manager-fffb75699 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 5d05461a-cf9d-4179-bad1-2600fad47c42 resourceVersion: "11668" uid: 6826aed6-b16b-4115-b8d6-5e5c0895d5ca spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: fffb75699 template: metadata: annotations: configmaps/client-ca: "7242" configmaps/config: "6253" configmaps/openshift-global-ca: "4562" configmaps/openshift-service-ca: "5374" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: fffb75699 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 kind: ReplicaSetList metadata: resourceVersion: "41011"