insights-operator/gathers.json0000640000000000000000000004122415147232364015263 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/feature_gates","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":37,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":70,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":14,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":12,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":22,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":32,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":21,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":94,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":33,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":100,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":225,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":22511,"records_count":58,"errors":["the record with the same name \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-ncrqj.json\" was already recorded and had the fingerprint \"f7ae6a292a82466c5990b0ae6e6dfda9b854a6286e36a98ee1ac05b54ad5a279\", overwriting with the record having fingerprint \"f7ae6a292a82466c5990b0ae6e6dfda9b854a6286e36a98ee1ac05b54ad5a279\"","the record with the same name \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-8zrj9.json\" was already recorded and had the fingerprint \"6566e1abb3a3bf6545b8dcc73b86d00bb9cd8002b5525c8d60908a2b49cf5ce8\", overwriting with the record having fingerprint \"6566e1abb3a3bf6545b8dcc73b86d00bb9cd8002b5525c8d60908a2b49cf5ce8\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-tfmbs.json\" was already recorded and had the fingerprint \"8d3d7cd876b33bae028037ac85119d525b2393c988642dfd86a14d129fa4a190\", overwriting with the record having fingerprint \"8d3d7cd876b33bae028037ac85119d525b2393c988642dfd86a14d129fa4a190\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-tfmbs/etcd-operator_previous.log\" was already recorded and had the fingerprint \"b56269dc6daf9b64f2921eae7e22c16f7d9d3accc8983e90b2594163be37ced7\", overwriting with the record having fingerprint \"b56269dc6daf9b64f2921eae7e22c16f7d9d3accc8983e90b2594163be37ced7\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-tfmbs/etcd-operator_current.log\" was already recorded and had the fingerprint \"4abe579d41e9ca502f07570d818b23f725397af04b53f3e3589eb5b00e53ffe8\", overwriting with the record having fingerprint \"4abe579d41e9ca502f07570d818b23f725397af04b53f3e3589eb5b00e53ffe8\""],"warnings":["warning: the record with the same fingerprint \"f7ae6a292a82466c5990b0ae6e6dfda9b854a6286e36a98ee1ac05b54ad5a279\" was already recorded at path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-ncrqj.json\", recording another one with a different path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-ncrqj.json\"","warning: the record with the same fingerprint \"6566e1abb3a3bf6545b8dcc73b86d00bb9cd8002b5525c8d60908a2b49cf5ce8\" was already recorded at path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-8zrj9.json\", recording another one with a different path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-8zrj9.json\"","warning: the record with the same fingerprint \"8d3d7cd876b33bae028037ac85119d525b2393c988642dfd86a14d129fa4a190\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-tfmbs.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-tfmbs.json\"","warning: the record with the same fingerprint \"b56269dc6daf9b64f2921eae7e22c16f7d9d3accc8983e90b2594163be37ced7\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-tfmbs/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-tfmbs/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"4abe579d41e9ca502f07570d818b23f725397af04b53f3e3589eb5b00e53ffe8\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-tfmbs/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-tfmbs/etcd-operator_current.log\""],"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":32,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":4840,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":30,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":23,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":22532,"records_count":149,"errors":["function \"pod_network_connectivity_checks\" failed with an error","function \"silenced_alerts\" failed with an error","function \"tsdb_status\" failed with an error","function \"active_alerts\" failed with an error","function \"metrics\" failed with an error","function \"machine_autoscalers\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-ncrqj.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-8zrj9.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-tfmbs.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-tfmbs/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-tfmbs/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":11,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10827,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":144,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11611,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":201,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":20,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":22,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":50,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":22,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":45,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":13,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":19,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":20,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":22,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":89,"records_count":12,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":11,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":20,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":20,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":10,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":13,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":20,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":62,"records_count":6,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":72,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"workloads/workload_info","duration_in_ms":4839,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":28.158,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515147232364017771 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515147232364021073 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005010115147232364014241 0ustar0000000000000000{"pods":78,"imageCount":58,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:b1d840665bf310fa455ddaff9b262dd0649440ca9ecf34d49b340ce669885568","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:16ea15164e7d71550d4c0e2c90d17f96edda4ab77123947b2e188ffb23951fa0","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:86ce6c3977c663ad9ad9a5d627bb08727af38fd3153a0a463a10b534030ee126","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"invalidCount":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f42321072d0ab781f41e8f595ed6f5efabe791e472c7d0784e61b3c214194656","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":3,"terminalCount":1,"shapes":[{"restartAlways":false,"containers":[{"imageID":"sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","firstCommand":"WFJEBSInAJpw","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"aC8iSHmKHojh","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","firstCommand":"WFJEBSInAJpw","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a1b426a276216372c7d688fe60e9eaf251efd35071f94e1bcd4337f51a90fd75","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:034588ffd95ce834e866279bf80a45af2cddda631c6c9a6344c1bb2e033fd83e","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":5,"terminalCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8ff40a2d97bf7a95e19303f7e972b7e8354a3864039111c6d33d5479117aaeed","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ebf883de8fd905490f0c9b420a5d6446ecde18e12e15364f6dcd4e885104972c","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce89154fa3fe1e87c660e644b58cf125fede575869fd5841600082c0d1f858a3","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:17a6e47ea4e958d63504f51c1bd512d7747ed786448c187b247a63d6ac12b7d6","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:17a6e47ea4e958d63504f51c1bd512d7747ed786448c187b247a63d6ac12b7d6","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2ba8aec9f09d75121b95d2e6f1097415302c0ae7121fa7076fd38d7adb9a5afa","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:572b0ca6e993beea2ee9346197665e56a2e4999fbb6958c747c48a35bf72ee34","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4797a485fd4ab3414ba8d52bdf2afccefab6c657b1d259baad703fca5145124c","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:0100af7f7148850360b455fb2535d72d417bf5d68eca583d1d7a40c849aae350","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f86073cf0561e4b69668f8917ef5184cb0ef5aa16d0fefe38118f1167b268721","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011154515147232357034026 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-df5f88cd4-cwzcs2026-02-24T05:19:20.641122330Z I0224 05:19:20.641088 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-24T05:19:20.641416728Z I0224 05:19:20.641296 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-24T05:19:20.641416728Z I0224 05:19:20.641339 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-24T05:19:20.641416728Z I0224 05:19:20.641347 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-24T05:19:20.641416728Z I0224 05:19:20.641356 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-24T05:19:20.641416728Z I0224 05:19:20.641365 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-24T05:19:20.641416728Z I0224 05:19:20.641372 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-24T05:19:20.740928215Z I0224 05:19:20.740852 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-24T05:19:20.740928215Z I0224 05:19:20.740853 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-24T05:19:20.741014497Z I0224 05:19:20.740871 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-24T05:19:20.741684505Z I0224 05:19:20.741665 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-24T05:19:20.741703295Z I0224 05:19:20.741693 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-24T05:19:20.741884350Z I0224 05:19:20.741817 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-24T05:19:20.987549183Z E0224 05:19:20.987491 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.987766949Z E0224 05:19:20.987714 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.988046476Z E0224 05:19:20.988008 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.988250302Z E0224 05:19:20.988225 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.989670528Z E0224 05:19:20.989617 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.003393040Z E0224 05:19:21.003343 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.003458942Z E0224 05:19:21.003422 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.003542524Z E0224 05:19:21.003511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.003679518Z E0224 05:19:21.003431 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.003833271Z E0224 05:19:21.003660 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.005162526Z E0224 05:19:21.004244 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.010282708Z E0224 05:19:21.010247 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.010531394Z E0224 05:19:21.010479 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.010804401Z E0224 05:19:21.010785 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.014599018Z E0224 05:19:21.014400 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.014690851Z E0224 05:19:21.014615 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.014879315Z E0224 05:19:21.014804 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.020246343Z E0224 05:19:21.020141 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.020413648Z E0224 05:19:21.020383 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.020674224Z E0224 05:19:21.020591 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.020674224Z E0224 05:19:21.020640 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.020905500Z E0224 05:19:21.020763 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.046492329Z E0224 05:19:21.038275 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.046492329Z E0224 05:19:21.038633 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.046492329Z E0224 05:19:21.038793 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.046492329Z E0224 05:19:21.038962 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.046492329Z E0224 05:19:21.039108 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.129186833Z E0224 05:19:21.129105 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.129186833Z E0224 05:19:21.129141 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.129186833Z E0224 05:19:21.129103 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.129222774Z E0224 05:19:21.129211 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.130569429Z E0224 05:19:21.129238 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.298712321Z E0224 05:19:21.297111 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.298712321Z E0224 05:19:21.297181 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.298712321Z E0224 05:19:21.297408 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.298712321Z E0224 05:19:21.297468 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.298712321Z E0224 05:19:21.297559 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.623377184Z E0224 05:19:21.623143 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.623536938Z E0224 05:19:21.623488 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.623642491Z E0224 05:19:21.623602 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.623642491Z E0224 05:19:21.623609 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.624047932Z E0224 05:19:21.623991 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:21.640244707Z W0224 05:19:21.640166 1 logging.go:55] [core] [Channel #4 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.65.66:50051: connect: connection refused" 2026-02-24T05:19:21.640349500Z W0224 05:19:21.640288 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.174.187:50051: connect: connection refused" 2026-02-24T05:19:21.642182087Z W0224 05:19:21.642145 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.249.132:50051: connect: connection refused" 2026-02-24T05:19:21.643060250Z W0224 05:19:21.643008 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.166.166:50051: connect: connection refused" 2026-02-24T05:19:22.266811890Z E0224 05:19:22.266737 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:22.266811890Z E0224 05:19:22.266786 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:22.266811890Z E0224 05:19:22.266785 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:22.266854752Z E0224 05:19:22.266737 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:22.266967244Z E0224 05:19:22.266790 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:23.329238365Z W0224 05:19:23.329163 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.174.187:50051: connect: connection refused" 2026-02-24T05:19:23.329573943Z W0224 05:19:23.329489 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.249.132:50051: connect: connection refused" 2026-02-24T05:19:23.333159706Z W0224 05:19:23.332615 1 logging.go:55] [core] [Channel #4 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.65.66:50051: connect: connection refused" 2026-02-24T05:19:23.553410476Z W0224 05:19:23.553351 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.166.166:50051: connect: connection refused" 2026-02-24T05:19:23.554297180Z E0224 05:19:23.554269 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:23.554517265Z E0224 05:19:23.554483 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:23.554619788Z E0224 05:19:23.554577 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:23.554694910Z E0224 05:19:23.554664 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:23.554780002Z E0224 05:19:23.554727 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:25.493543358Z W0224 05:19:25.493483 1 logging.go:55] [core] [Channel #4 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.65.66:50051: connect: connection refused" 2026-02-24T05:19:26.032764706Z W0224 05:19:26.032593 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.174.187:50051: connect: connection refused" 2026-02-24T05:19:26.123836577Z E0224 05:19:26.123778 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:26.123867818Z E0224 05:19:26.123821 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:26.123986831Z E0224 05:19:26.123961 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:26.124065473Z E0224 05:19:26.124044 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:26.124187046Z E0224 05:19:26.124145 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:26.303483224Z W0224 05:19:26.303302 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.249.132:50051: connect: connection refused" 2026-02-24T05:19:26.331649048Z W0224 05:19:26.331386 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.166.166:50051: connect: connection refused" 2026-02-24T05:19:29.177627150Z W0224 05:19:29.177547 1 logging.go:55] [core] [Channel #4 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.65.66:50051: connect: connection refused" 2026-02-24T05:19:29.459335660Z W0224 05:19:29.459232 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.174.187:50051: connect: connection refused" 2026-02-24T05:19:29.742607030Z W0224 05:19:29.742535 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.249.132:50051: connect: connection refused" 2026-02-24T05:19:30.394746940Z W0224 05:19:30.394695 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.166.166:50051: connect: connection refused" 2026-02-24T05:19:31.251049737Z E0224 05:19:31.250994 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:31.251374735Z E0224 05:19:31.251249 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:31.251615621Z E0224 05:19:31.251266 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:31.251660012Z E0224 05:19:31.251120 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:31.251815886Z E0224 05:19:31.251340 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:34.886467248Z W0224 05:19:34.886376 1 logging.go:55] [core] [Channel #4 SubChannel #7]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.65.66:50051: connect: connection refused" 2026-02-24T05:19:35.512460956Z W0224 05:19:35.512364 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.174.187:50051: connect: connection refused" 2026-02-24T05:19:37.028614964Z W0224 05:19:37.028524 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.249.132:50051: connect: connection refused" 2026-02-24T05:19:38.217703872Z W0224 05:19:38.217575 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.166.166:50051: connect: connection refused" 2026-02-24T05:19:41.495747728Z E0224 05:19:41.495652 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:41.495818390Z E0224 05:19:41.495797 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:41.496023175Z E0224 05:19:41.495652 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:41.496213290Z E0224 05:19:41.496177 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:41.496602740Z E0224 05:19:41.496542 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" package-server-manager_current.log0000640000000000000000000003251615147232357036711 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c75f78c8b-9d82f2026-02-24T05:15:18.454812332Z 2026-02-24T05:15:18Z INFO setup starting manager 2026-02-24T05:15:18.456352645Z 2026-02-24T05:15:18Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-02-24T05:15:18.456557061Z 2026-02-24T05:15:18Z INFO controller-runtime.metrics Starting metrics server 2026-02-24T05:15:18.456831218Z 2026-02-24T05:15:18Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-02-24T05:15:18.456954652Z 2026-02-24T05:15:18Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-02-24T05:15:18.459195654Z I0224 05:15:18.457681 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-02-24T05:15:18.472553766Z I0224 05:15:18.472504 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-02-24T05:15:18.472786062Z 2026-02-24T05:15:18Z DEBUG events package-server-manager-5c75f78c8b-9d82f_8891dc3b-a5f0-4335-9a00-ffdb5d70df9f became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"c12026ec-5947-4d62-b164-e41b84679e56","apiVersion":"coordination.k8s.io/v1","resourceVersion":"6857"}, "reason": "LeaderElection"} 2026-02-24T05:15:18.474808629Z 2026-02-24T05:15:18Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-02-24T05:15:18.475076506Z 2026-02-24T05:15:18Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-02-24T05:15:18.475076506Z 2026-02-24T05:15:18Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-02-24T05:15:18.589432996Z 2026-02-24T05:15:18Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-02-24T05:15:18.589565190Z 2026-02-24T05:15:18Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-02-24T05:15:18.591214105Z 2026-02-24T05:15:18Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-24T05:15:18.591231405Z 2026-02-24T05:15:18Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:15:18.898270003Z 2026-02-24T05:15:18Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:15:18.902767338Z 2026-02-24T05:15:18Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-24T05:15:18.952331586Z 2026-02-24T05:15:18Z INFO controllers.packageserver attempting to create the packageserver csv 2026-02-24T05:15:18.957257804Z 2026-02-24T05:15:18Z INFO controllers.packageserver updating csv spec 2026-02-24T05:15:18.986434804Z 2026-02-24T05:15:18Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-02-24T05:15:18.986434804Z 2026-02-24T05:15:18Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:15:18.986434804Z 2026-02-24T05:15:18Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-24T05:15:18.986434804Z 2026-02-24T05:15:18Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:15:18.986508016Z 2026-02-24T05:15:18Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:15:18.986580508Z 2026-02-24T05:15:18Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-24T05:15:19.014657469Z 2026-02-24T05:15:19Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-24T05:15:19.014657469Z 2026-02-24T05:15:19Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:16:52.524037608Z E0224 05:16:52.523804 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-24T05:17:52.527176068Z E0224 05:17:52.527058 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-02-24T05:19:04.702972006Z 2026-02-24T05:19:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-24T05:19:04.702972006Z 2026-02-24T05:19:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:04.702972006Z 2026-02-24T05:19:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:04.703037368Z 2026-02-24T05:19:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-24T05:19:04.740380902Z 2026-02-24T05:19:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-24T05:19:04.740380902Z 2026-02-24T05:19:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:04.751605920Z 2026-02-24T05:19:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-24T05:19:04.751605920Z 2026-02-24T05:19:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:04.751605920Z 2026-02-24T05:19:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:04.751605920Z 2026-02-24T05:19:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-24T05:19:04.798516608Z 2026-02-24T05:19:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-24T05:19:04.798516608Z 2026-02-24T05:19:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:04.859458128Z 2026-02-24T05:19:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-24T05:19:04.859458128Z 2026-02-24T05:19:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:04.859501799Z 2026-02-24T05:19:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:04.859527250Z 2026-02-24T05:19:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-24T05:19:04.883354564Z 2026-02-24T05:19:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-24T05:19:04.883354564Z 2026-02-24T05:19:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:05.854412907Z 2026-02-24T05:19:05Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-24T05:19:05.854412907Z 2026-02-24T05:19:05Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:05.854412907Z 2026-02-24T05:19:05Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:05.854412907Z 2026-02-24T05:19:05Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-24T05:19:05.871640066Z 2026-02-24T05:19:05Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-24T05:19:05.871640066Z 2026-02-24T05:19:05Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:06.652939442Z 2026-02-24T05:19:06Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-24T05:19:06.652939442Z 2026-02-24T05:19:06Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:06.653004595Z 2026-02-24T05:19:06Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:06.653057347Z 2026-02-24T05:19:06Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-24T05:19:06.672061971Z 2026-02-24T05:19:06Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-24T05:19:06.672061971Z 2026-02-24T05:19:06Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:06.999338315Z 2026-02-24T05:19:06Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-24T05:19:06.999338315Z 2026-02-24T05:19:06Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:07.160598314Z 2026-02-24T05:19:07Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-24T05:19:07.162588406Z 2026-02-24T05:19:07Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-24T05:19:07.189652696Z 2026-02-24T05:19:07Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-24T05:19:07.189652696Z 2026-02-24T05:19:07Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415147232357035406 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c75f78c8b-9d82f2026-02-24T05:15:07.145171894Z W0224 05:15:07.144933 1 deprecated.go:66] 2026-02-24T05:15:07.145171894Z ==== Removed Flag Warning ====================== 2026-02-24T05:15:07.145171894Z 2026-02-24T05:15:07.145171894Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-24T05:15:07.145171894Z 2026-02-24T05:15:07.145171894Z =============================================== 2026-02-24T05:15:07.145171894Z 2026-02-24T05:15:07.146920493Z I0224 05:15:07.146794 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-24T05:15:07.149035302Z I0224 05:15:07.148987 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-24T05:15:07.149432663Z I0224 05:15:07.149396 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-24T05:15:07.150243535Z I0224 05:15:07.150220 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415147232357033350 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-5499d7f7bb-8xdmq2026-02-24T05:19:24.237598491Z time="2026-02-24T05:19:24Z" level=info msg="install strategy successful" csv=packageserver id=bmN6e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:24.337147899Z time="2026-02-24T05:19:24Z" level=info msg="install strategy successful" csv=packageserver id=+wZY2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:24.438037711Z time="2026-02-24T05:19:24Z" level=info msg="install strategy successful" csv=packageserver id=C+ccf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:24.527747577Z time="2026-02-24T05:19:24Z" level=info msg="install strategy successful" csv=packageserver id=NGTHS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:24.628774623Z time="2026-02-24T05:19:24Z" level=info msg="install strategy successful" csv=packageserver id=/121e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:24.729438580Z time="2026-02-24T05:19:24Z" level=info msg="install strategy successful" csv=packageserver id=P3pqm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:24.826852354Z time="2026-02-24T05:19:24Z" level=info msg="install strategy successful" csv=packageserver id=dc2t4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:24.927299156Z time="2026-02-24T05:19:24Z" level=info msg="install strategy successful" csv=packageserver id=9j/8p namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:25.027818069Z time="2026-02-24T05:19:25Z" level=info msg="install strategy successful" csv=packageserver id=IJyFa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:25.127822039Z time="2026-02-24T05:19:25Z" level=info msg="install strategy successful" csv=packageserver id=sYsep namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:25.236156193Z time="2026-02-24T05:19:25Z" level=info msg="install strategy successful" csv=packageserver id=yqm6J namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:25.331920314Z time="2026-02-24T05:19:25Z" level=info msg="install strategy successful" csv=packageserver id=T7sGs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:25.434881501Z time="2026-02-24T05:19:25Z" level=info msg="install strategy successful" csv=packageserver id=BmiHc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:25.533705070Z time="2026-02-24T05:19:25Z" level=info msg="install strategy successful" csv=packageserver id=M6mcC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:25.633865945Z time="2026-02-24T05:19:25Z" level=info msg="install strategy successful" csv=packageserver id=MyJTO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:25.738183775Z time="2026-02-24T05:19:25Z" level=info msg="install strategy successful" csv=packageserver id=vAooA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:25.835264241Z time="2026-02-24T05:19:25Z" level=info msg="install strategy successful" csv=packageserver id=6s6xU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:25.936921033Z time="2026-02-24T05:19:25Z" level=info msg="install strategy successful" csv=packageserver id=QMcxS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:26.037260862Z time="2026-02-24T05:19:26Z" level=info msg="install strategy successful" csv=packageserver id=oHMcI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:26.137031136Z time="2026-02-24T05:19:26Z" level=info msg="install strategy successful" csv=packageserver id=TkOPN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:26.240984568Z time="2026-02-24T05:19:26Z" level=info msg="install strategy successful" csv=packageserver id=VSjwi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:26.338175665Z time="2026-02-24T05:19:26Z" level=info msg="install strategy successful" csv=packageserver id=8H9c7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:26.438214406Z time="2026-02-24T05:19:26Z" level=info msg="install strategy successful" csv=packageserver id=OCn38 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:26.538196416Z time="2026-02-24T05:19:26Z" level=info msg="install strategy successful" csv=packageserver id=o8bZm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:26.630129619Z time="2026-02-24T05:19:26Z" level=info msg="install strategy successful" csv=packageserver id=mwvze namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:26.728563659Z time="2026-02-24T05:19:26Z" level=info msg="install strategy successful" csv=packageserver id=mGh08 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:26.829257707Z time="2026-02-24T05:19:26Z" level=info msg="install strategy successful" csv=packageserver id=AMb7g namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:26.930690033Z time="2026-02-24T05:19:26Z" level=info msg="install strategy successful" csv=packageserver id=q3TJQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:27.029651176Z time="2026-02-24T05:19:27Z" level=info msg="install strategy successful" csv=packageserver id=xmM2p namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:27.129501833Z time="2026-02-24T05:19:27Z" level=info msg="install strategy successful" csv=packageserver id=GiNdG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:27.227903812Z time="2026-02-24T05:19:27Z" level=info msg="install strategy successful" csv=packageserver id=O0UFp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:27.329243636Z time="2026-02-24T05:19:27Z" level=info msg="install strategy successful" csv=packageserver id=KWR2+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:27.429288767Z time="2026-02-24T05:19:27Z" level=info msg="install strategy successful" csv=packageserver id=kBEul namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:27.532390287Z time="2026-02-24T05:19:27Z" level=info msg="install strategy successful" csv=packageserver id=vXaxQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:27.628368554Z time="2026-02-24T05:19:27Z" level=info msg="install strategy successful" csv=packageserver id=Nr9E2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:27.728882127Z time="2026-02-24T05:19:27Z" level=info msg="install strategy successful" csv=packageserver id=F77Is namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:27.829325649Z time="2026-02-24T05:19:27Z" level=info msg="install strategy successful" csv=packageserver id=gjcpc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:27.927953723Z time="2026-02-24T05:19:27Z" level=info msg="install strategy successful" csv=packageserver id=3Z8YK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:28.027201414Z time="2026-02-24T05:19:28Z" level=info msg="install strategy successful" csv=packageserver id=s59qH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:28.294153685Z time="2026-02-24T05:19:28Z" level=info msg="install strategy successful" csv=packageserver id=vexPA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:28.388755996Z time="2026-02-24T05:19:28Z" level=info msg="install strategy successful" csv=packageserver id=ZqBJM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:28.488740355Z time="2026-02-24T05:19:28Z" level=info msg="install strategy successful" csv=packageserver id=nBLsp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:28.589072594Z time="2026-02-24T05:19:28Z" level=info msg="install strategy successful" csv=packageserver id=Wp2hp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:28.620548323Z time="2026-02-24T05:19:28Z" level=info msg="install strategy successful" csv=packageserver id=ZlZW7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:28.630249513Z time="2026-02-24T05:19:28Z" level=info msg="install strategy successful" csv=packageserver id=xKH0C namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:28.728890498Z time="2026-02-24T05:19:28Z" level=info msg="install strategy successful" csv=packageserver id=NNzi8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:28.828003684Z time="2026-02-24T05:19:28Z" level=info msg="install strategy successful" csv=packageserver id=rork2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:28.929885644Z time="2026-02-24T05:19:28Z" level=info msg="install strategy successful" csv=packageserver id=twDgN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:29.028638491Z time="2026-02-24T05:19:29Z" level=info msg="install strategy successful" csv=packageserver id=SSsPp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:29.128550599Z time="2026-02-24T05:19:29Z" level=info msg="install strategy successful" csv=packageserver id=5F15c namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:29.228960199Z time="2026-02-24T05:19:29Z" level=info msg="install strategy successful" csv=packageserver id=pZlSV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:29.327964564Z time="2026-02-24T05:19:29Z" level=info msg="install strategy successful" csv=packageserver id=TnQmW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:29.429268787Z time="2026-02-24T05:19:29Z" level=info msg="install strategy successful" csv=packageserver id=tvGTz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:29.528701242Z time="2026-02-24T05:19:29Z" level=info msg="install strategy successful" csv=packageserver id=wM7mS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:29.628779614Z time="2026-02-24T05:19:29Z" level=info msg="install strategy successful" csv=packageserver id=TggcZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:29.728814755Z time="2026-02-24T05:19:29Z" level=info msg="install strategy successful" csv=packageserver id=xb7ID namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:29.828123137Z time="2026-02-24T05:19:29Z" level=info msg="install strategy successful" csv=packageserver id=OhHbx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:29.928700842Z time="2026-02-24T05:19:29Z" level=info msg="install strategy successful" csv=packageserver id=GWXdm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:30.028160909Z time="2026-02-24T05:19:30Z" level=info msg="install strategy successful" csv=packageserver id=4Smky namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:30.127597504Z time="2026-02-24T05:19:30Z" level=info msg="install strategy successful" csv=packageserver id=42ruy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:30.230854128Z time="2026-02-24T05:19:30Z" level=info msg="install strategy successful" csv=packageserver id=GRVO2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:30.336744159Z time="2026-02-24T05:19:30Z" level=info msg="install strategy successful" csv=packageserver id=kXYKu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:30.437965721Z time="2026-02-24T05:19:30Z" level=info msg="install strategy successful" csv=packageserver id=OmRQ/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:30.528769884Z time="2026-02-24T05:19:30Z" level=info msg="install strategy successful" csv=packageserver id=ImoZ0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:30.629283467Z time="2026-02-24T05:19:30Z" level=info msg="install strategy successful" csv=packageserver id=aQiJq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:30.727742317Z time="2026-02-24T05:19:30Z" level=info msg="install strategy successful" csv=packageserver id=9kdnZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:30.828939169Z time="2026-02-24T05:19:30Z" level=info msg="install strategy successful" csv=packageserver id=G2VHi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:30.927718547Z time="2026-02-24T05:19:30Z" level=info msg="install strategy successful" csv=packageserver id=qdyC4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:31.027771108Z time="2026-02-24T05:19:31Z" level=info msg="install strategy successful" csv=packageserver id=WkD/2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:31.128697453Z time="2026-02-24T05:19:31Z" level=info msg="install strategy successful" csv=packageserver id=KIBaV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:31.227007639Z time="2026-02-24T05:19:31Z" level=info msg="install strategy successful" csv=packageserver id=Sr0ie namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:31.327991685Z time="2026-02-24T05:19:31Z" level=info msg="install strategy successful" csv=packageserver id=GWA71 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:31.428342753Z time="2026-02-24T05:19:31Z" level=info msg="install strategy successful" csv=packageserver id=is7uk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:31.528705682Z time="2026-02-24T05:19:31Z" level=info msg="install strategy successful" csv=packageserver id=OnSTk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:31.628191830Z time="2026-02-24T05:19:31Z" level=info msg="install strategy successful" csv=packageserver id=G1bkY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:31.728889948Z time="2026-02-24T05:19:31Z" level=info msg="install strategy successful" csv=packageserver id=q3xPm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:31.828829725Z time="2026-02-24T05:19:31Z" level=info msg="install strategy successful" csv=packageserver id=uU2r1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:31.927600995Z time="2026-02-24T05:19:31Z" level=info msg="install strategy successful" csv=packageserver id=DoeFP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:32.028103368Z time="2026-02-24T05:19:32Z" level=info msg="install strategy successful" csv=packageserver id=pQ63m namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:32.127255836Z time="2026-02-24T05:19:32Z" level=info msg="install strategy successful" csv=packageserver id=Ju9Pq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:32.227494592Z time="2026-02-24T05:19:32Z" level=info msg="install strategy successful" csv=packageserver id=9b5ig namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:32.329493673Z time="2026-02-24T05:19:32Z" level=info msg="install strategy successful" csv=packageserver id=Qbz2g namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:32.484631381Z time="2026-02-24T05:19:32Z" level=info msg="install strategy successful" csv=packageserver id=4amKf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:32.527123842Z time="2026-02-24T05:19:32Z" level=info msg="install strategy successful" csv=packageserver id=gOf34 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:32.627226644Z time="2026-02-24T05:19:32Z" level=info msg="install strategy successful" csv=packageserver id=up2zk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:32.726193288Z time="2026-02-24T05:19:32Z" level=info msg="install strategy successful" csv=packageserver id=e5JzQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:32.831398522Z time="2026-02-24T05:19:32Z" level=info msg="install strategy successful" csv=packageserver id=h9np4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:32.928721873Z time="2026-02-24T05:19:32Z" level=info msg="install strategy successful" csv=packageserver id=JbvZv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:33.028558200Z time="2026-02-24T05:19:33Z" level=info msg="install strategy successful" csv=packageserver id=VfLP/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:33.128386465Z time="2026-02-24T05:19:33Z" level=info msg="install strategy successful" csv=packageserver id=46Bgm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:33.229376620Z time="2026-02-24T05:19:33Z" level=info msg="install strategy successful" csv=packageserver id=oVMBp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:33.328645832Z time="2026-02-24T05:19:33Z" level=info msg="install strategy successful" csv=packageserver id=K75w9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:33.427581034Z time="2026-02-24T05:19:33Z" level=info msg="install strategy successful" csv=packageserver id=hpAR0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:33.620253356Z time="2026-02-24T05:19:33Z" level=info msg="install strategy successful" csv=packageserver id=43tL2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:35.033018664Z time="2026-02-24T05:19:35Z" level=info msg="install strategy successful" csv=packageserver id=ghhnW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:38.146399970Z time="2026-02-24T05:19:38Z" level=info msg="install strategy successful" csv=packageserver id=/VWCw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:41.453400710Z time="2026-02-24T05:19:41Z" level=info msg="install strategy successful" csv=packageserver id=HzSjH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:41.476553474Z time="2026-02-24T05:19:41Z" level=info msg="install strategy successful" csv=packageserver id=g5unt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:42.285706500Z time="2026-02-24T05:19:42Z" level=info msg="install strategy successful" csv=packageserver id=iZM9y namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-24T05:19:42.660453711Z time="2026-02-24T05:19:42Z" level=info msg="install strategy successful" csv=packageserver id=3Ag1F namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment collect-profiles_current.log0000640000000000000000000000037315147232357034436 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/collect-profiles-29531835-tsgrz2026-02-24T05:19:26.311501920Z time="2026-02-24T05:19:26Z" level=info msg="error verifying provided cert and key: cert file should not be empty" 2026-02-24T05:19:26.311501920Z time="2026-02-24T05:19:26Z" level=info msg="generating a new cert and key" catalog-operator_current.log0000640000000000000000000005617215147232357034624 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-596f79dd6f-v22h22026-02-24T05:19:18.892364127Z time="2026-02-24T05:19:18Z" level=info msg="checking if subscriptions need update" id=d1TKp namespace=openshift-service-ca 2026-02-24T05:19:19.093996589Z time="2026-02-24T05:19:19Z" level=info msg="No subscriptions were found in namespace openshift-route-controller-manager" id=KfBgJ namespace=openshift-route-controller-manager 2026-02-24T05:19:19.093996589Z time="2026-02-24T05:19:19Z" level=info msg="resolving sources" id=PCHf9 namespace=openshift-service-ca-operator 2026-02-24T05:19:19.093996589Z time="2026-02-24T05:19:19Z" level=info msg="checking if subscriptions need update" id=PCHf9 namespace=openshift-service-ca-operator 2026-02-24T05:19:19.292961512Z time="2026-02-24T05:19:19Z" level=info msg="No subscriptions were found in namespace openshift-service-ca" id=d1TKp namespace=openshift-service-ca 2026-02-24T05:19:19.293006913Z time="2026-02-24T05:19:19Z" level=info msg="resolving sources" id=fJeiv namespace=openshift-user-workload-monitoring 2026-02-24T05:19:19.293006913Z time="2026-02-24T05:19:19Z" level=info msg="checking if subscriptions need update" id=fJeiv namespace=openshift-user-workload-monitoring 2026-02-24T05:19:19.494496791Z time="2026-02-24T05:19:19Z" level=info msg="No subscriptions were found in namespace openshift-service-ca-operator" id=PCHf9 namespace=openshift-service-ca-operator 2026-02-24T05:19:19.494496791Z time="2026-02-24T05:19:19Z" level=info msg="resolving sources" id=H8/YW namespace=openshift-vsphere-infra 2026-02-24T05:19:19.494496791Z time="2026-02-24T05:19:19Z" level=info msg="checking if subscriptions need update" id=H8/YW namespace=openshift-vsphere-infra 2026-02-24T05:19:19.702293072Z time="2026-02-24T05:19:19Z" level=info msg="No subscriptions were found in namespace openshift-user-workload-monitoring" id=fJeiv namespace=openshift-user-workload-monitoring 2026-02-24T05:19:19.702370114Z time="2026-02-24T05:19:19Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=kepIQ 2026-02-24T05:19:19.703155494Z time="2026-02-24T05:19:19Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-68vwc current-pod.namespace=openshift-marketplace id=kepIQ 2026-02-24T05:19:19.703155494Z time="2026-02-24T05:19:19Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-68vwc current-pod.namespace=openshift-marketplace id=kepIQ 2026-02-24T05:19:19.703155494Z time="2026-02-24T05:19:19Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=kepIQ 2026-02-24T05:19:19.703155494Z time="2026-02-24T05:19:19Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=kepIQ 2026-02-24T05:19:19.703155494Z time="2026-02-24T05:19:19Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:19.703155494Z time="2026-02-24T05:19:19Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:19.897797466Z time="2026-02-24T05:19:19Z" level=info msg="No subscriptions were found in namespace openshift-vsphere-infra" id=H8/YW namespace=openshift-vsphere-infra 2026-02-24T05:19:19.898169766Z time="2026-02-24T05:19:19Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=h8hHU 2026-02-24T05:19:19.898169766Z time="2026-02-24T05:19:19Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-v64s6 current-pod.namespace=openshift-marketplace id=h8hHU 2026-02-24T05:19:19.898169766Z time="2026-02-24T05:19:19Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-v64s6 current-pod.namespace=openshift-marketplace id=h8hHU 2026-02-24T05:19:19.898407902Z time="2026-02-24T05:19:19Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=h8hHU 2026-02-24T05:19:19.898407902Z time="2026-02-24T05:19:19Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=h8hHU 2026-02-24T05:19:19.898407902Z time="2026-02-24T05:19:19Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:19.898407902Z time="2026-02-24T05:19:19Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:20.500624540Z time="2026-02-24T05:19:20Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:20.500624540Z time="2026-02-24T05:19:20Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-xm8sw current-pod.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:20.500624540Z time="2026-02-24T05:19:20Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-xm8sw current-pod.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:20.500624540Z time="2026-02-24T05:19:20Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=K1KNU 2026-02-24T05:19:20.500624540Z time="2026-02-24T05:19:20Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:20.500624540Z time="2026-02-24T05:19:20Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:20.694170044Z time="2026-02-24T05:19:20Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:20.694170044Z time="2026-02-24T05:19:20Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gn8m8 current-pod.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:20.694170044Z time="2026-02-24T05:19:20Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gn8m8 current-pod.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:20.694170044Z time="2026-02-24T05:19:20Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=+wOyf 2026-02-24T05:19:20.694170044Z time="2026-02-24T05:19:20Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:20.694170044Z time="2026-02-24T05:19:20Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:21.692595783Z time="2026-02-24T05:19:21Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:21.693086585Z time="2026-02-24T05:19:21Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-xm8sw current-pod.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:21.693086585Z time="2026-02-24T05:19:21Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-xm8sw current-pod.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:21.693086585Z time="2026-02-24T05:19:21Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:21.693086585Z time="2026-02-24T05:19:21Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=K1KNU 2026-02-24T05:19:21.693086585Z time="2026-02-24T05:19:21Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:21.693086585Z time="2026-02-24T05:19:21Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:21.897722395Z time="2026-02-24T05:19:21Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:21.897722395Z time="2026-02-24T05:19:21Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gn8m8 current-pod.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:21.897722395Z time="2026-02-24T05:19:21Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gn8m8 current-pod.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:21.897722395Z time="2026-02-24T05:19:21Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:21.897722395Z time="2026-02-24T05:19:21Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=+wOyf 2026-02-24T05:19:21.897722395Z time="2026-02-24T05:19:21Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:21.897722395Z time="2026-02-24T05:19:21Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:22.492624334Z time="2026-02-24T05:19:22Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:22.492763918Z time="2026-02-24T05:19:22Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-68vwc current-pod.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:22.492763918Z time="2026-02-24T05:19:22Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-68vwc current-pod.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:22.492775058Z time="2026-02-24T05:19:22Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=S9qex 2026-02-24T05:19:22.492783678Z time="2026-02-24T05:19:22Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:22.492783678Z time="2026-02-24T05:19:22Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:22.692976533Z time="2026-02-24T05:19:22Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:22.693067335Z time="2026-02-24T05:19:22Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-v64s6 current-pod.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:22.693075935Z time="2026-02-24T05:19:22Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-v64s6 current-pod.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:22.693082786Z time="2026-02-24T05:19:22Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=yOaKr 2026-02-24T05:19:22.693089636Z time="2026-02-24T05:19:22Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:22.693130567Z time="2026-02-24T05:19:22Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:23.691773993Z time="2026-02-24T05:19:23Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:23.691977908Z time="2026-02-24T05:19:23Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-68vwc current-pod.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:23.691977908Z time="2026-02-24T05:19:23Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-68vwc current-pod.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:23.692094181Z time="2026-02-24T05:19:23Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:23.692094181Z time="2026-02-24T05:19:23Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=S9qex 2026-02-24T05:19:23.692192523Z time="2026-02-24T05:19:23Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:23.692192523Z time="2026-02-24T05:19:23Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:23.892558702Z time="2026-02-24T05:19:23Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:23.892729588Z time="2026-02-24T05:19:23Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-v64s6 current-pod.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:23.892738868Z time="2026-02-24T05:19:23Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-v64s6 current-pod.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:23.892842280Z time="2026-02-24T05:19:23Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:23.892851171Z time="2026-02-24T05:19:23Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=yOaKr 2026-02-24T05:19:23.892940033Z time="2026-02-24T05:19:23Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=Y7IUe 2026-02-24T05:19:23.892952493Z time="2026-02-24T05:19:23Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=Y7IUe 2026-02-24T05:19:24.492883811Z time="2026-02-24T05:19:24Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:24.493035505Z time="2026-02-24T05:19:24Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-xm8sw current-pod.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:24.493050656Z time="2026-02-24T05:19:24Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-xm8sw current-pod.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:24.493060576Z time="2026-02-24T05:19:24Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=UdpnS 2026-02-24T05:19:24.493078206Z time="2026-02-24T05:19:24Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:24.493086067Z time="2026-02-24T05:19:24Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:24.692089021Z time="2026-02-24T05:19:24Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=Y7IUe 2026-02-24T05:19:24.692191534Z time="2026-02-24T05:19:24Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gn8m8 current-pod.namespace=openshift-marketplace id=Y7IUe 2026-02-24T05:19:24.692191534Z time="2026-02-24T05:19:24Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gn8m8 current-pod.namespace=openshift-marketplace id=Y7IUe 2026-02-24T05:19:24.692202084Z time="2026-02-24T05:19:24Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=Y7IUe 2026-02-24T05:19:24.692202084Z time="2026-02-24T05:19:24Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=Y7IUe 2026-02-24T05:19:24.692209994Z time="2026-02-24T05:19:24Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=Y7IUe 2026-02-24T05:19:25.709766625Z time="2026-02-24T05:19:25Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:25.709766625Z time="2026-02-24T05:19:25Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-xm8sw current-pod.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:25.709766625Z time="2026-02-24T05:19:25Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-xm8sw current-pod.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:25.709766625Z time="2026-02-24T05:19:25Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:25.709766625Z time="2026-02-24T05:19:25Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=UdpnS 2026-02-24T05:19:25.928452915Z time="2026-02-24T05:19:25Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=Y7IUe 2026-02-24T05:19:25.928452915Z time="2026-02-24T05:19:25Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gn8m8 current-pod.namespace=openshift-marketplace id=Y7IUe 2026-02-24T05:19:25.928452915Z time="2026-02-24T05:19:25Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-gn8m8 current-pod.namespace=openshift-marketplace id=Y7IUe 2026-02-24T05:19:25.928452915Z time="2026-02-24T05:19:25Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=Y7IUe 2026-02-24T05:19:25.928452915Z time="2026-02-24T05:19:25Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=Y7IUe config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-tfmbs/etcd-operator_current.log0000640000000000000000000001055315147232357031313 0ustar00000000000000002026-02-24T05:17:43.650252246Z I0224 05:17:43.649867 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-02-24T05:17:43.650547733Z I0224 05:17:43.650392 1 observer_polling.go:159] Starting file observer 2026-02-24T05:17:43.651056377Z I0224 05:17:43.650971 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-24T05:17:43.651161150Z I0224 05:17:43.651091 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-24T05:17:43.652153374Z I0224 05:17:43.651903 1 observer_polling.go:159] Starting file observer 2026-02-24T05:18:26.925954718Z I0224 05:18:26.925831 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601302238.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9 2026-02-24T05:18:44.589684497Z I0224 05:18:44.589589 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-24T05:18:44.589684497Z W0224 05:18:44.589637 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-24T05:18:44.589684497Z W0224 05:18:44.589650 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-24T05:18:44.589684497Z W0224 05:18:44.589659 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-24T05:18:44.589684497Z W0224 05:18:44.589665 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-24T05:18:44.589684497Z W0224 05:18:44.589671 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-24T05:18:44.589781109Z W0224 05:18:44.589677 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-24T05:18:44.593270542Z I0224 05:18:44.593172 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-24T05:18:44.593270542Z I0224 05:18:44.593161 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-24T05:18:44.593336514Z I0224 05:18:44.593267 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-24T05:18:44.593413766Z I0224 05:18:44.593366 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-24T05:18:44.593413766Z I0224 05:18:44.593402 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-24T05:18:44.593507618Z I0224 05:18:44.593463 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-24T05:18:44.593507618Z I0224 05:18:44.593472 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-24T05:18:44.593533009Z I0224 05:18:44.593508 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-24T05:18:44.593610981Z I0224 05:18:44.593555 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-24T05:18:44.594598197Z I0224 05:18:44.594505 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-24T05:18:44.595119661Z I0224 05:18:44.595040 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-02-24T05:18:44.694122374Z I0224 05:18:44.693979 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-24T05:18:44.694713059Z I0224 05:18:44.694651 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-24T05:18:44.694713059Z I0224 05:18:44.694680 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-tfmbs/etcd-operator_previous.log0000640000000000000000000004451415147232357031511 0ustar00000000000000002026-02-24T05:15:50.861529083Z I0224 05:15:50.861512 1 base_controller.go:181] Shutting down RevisionController ... 2026-02-24T05:15:50.861591174Z I0224 05:15:50.861546 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-02-24T05:15:50.861591174Z I0224 05:15:50.861543 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-02-24T05:15:50.861591174Z I0224 05:15:50.861575 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-02-24T05:15:50.861715688Z I0224 05:15:50.861611 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-02-24T05:15:50.861715688Z I0224 05:15:50.861128 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-02-24T05:15:50.861715688Z I0224 05:15:50.861650 1 base_controller.go:113] All PruneController workers have been terminated 2026-02-24T05:15:50.861715688Z I0224 05:15:50.861664 1 controller_manager.go:54] PruneController controller terminated 2026-02-24T05:15:50.861755139Z I0224 05:15:50.861710 1 base_controller.go:113] All RevisionController workers have been terminated 2026-02-24T05:15:50.861755139Z I0224 05:15:50.861727 1 controller_manager.go:54] RevisionController controller terminated 2026-02-24T05:15:50.861831131Z I0224 05:15:50.861805 1 base_controller.go:181] Shutting down etcd-Node ... 2026-02-24T05:15:50.861904603Z I0224 05:15:50.861885 1 base_controller.go:181] Shutting down etcd-StaticPodState ... 2026-02-24T05:15:50.861959445Z I0224 05:15:50.860487 1 base_controller.go:181] Shutting down DefragController ... 2026-02-24T05:15:50.862049797Z I0224 05:15:50.862003 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-24T05:15:50.862087648Z I0224 05:15:50.862058 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-02-24T05:15:50.862103969Z I0224 05:15:50.862087 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-24T05:15:50.862161370Z I0224 05:15:50.862140 1 base_controller.go:181] Shutting down etcd-InstallerState ... 2026-02-24T05:15:50.862222672Z I0224 05:15:50.862005 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-88700378/tls.crt::/tmp/serving-cert-88700378/tls.key" 2026-02-24T05:15:50.862301954Z I0224 05:15:50.862261 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-02-24T05:15:50.862301954Z I0224 05:15:50.862291 1 builder.go:335] server exited 2026-02-24T05:15:50.862352045Z I0224 05:15:50.862295 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2026-02-24T05:15:50.862376136Z I0224 05:15:50.862355 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-02-24T05:15:50.862376136Z I0224 05:15:50.861576 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-02-24T05:15:50.862376136Z I0224 05:15:50.862369 1 controller_manager.go:54] etcd-Node controller terminated 2026-02-24T05:15:50.862393907Z I0224 05:15:50.862012 1 base_controller.go:113] All DefragController workers have been terminated 2026-02-24T05:15:50.862409667Z I0224 05:15:50.861998 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-02-24T05:15:50.862425417Z I0224 05:15:50.862145 1 base_controller.go:123] Shutting down worker of MachineDeletionHooksController controller ... 2026-02-24T05:15:50.862485229Z I0224 05:15:50.862435 1 base_controller.go:113] All MachineDeletionHooksController workers have been terminated 2026-02-24T05:15:50.862485229Z I0224 05:15:50.862158 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-02-24T05:15:50.862503290Z I0224 05:15:50.862485 1 base_controller.go:113] All Installer workers have been terminated 2026-02-24T05:15:50.862519150Z I0224 05:15:50.862494 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-02-24T05:15:50.862519150Z I0224 05:15:50.862499 1 controller_manager.go:54] Installer controller terminated 2026-02-24T05:15:50.862535580Z I0224 05:15:50.862517 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-02-24T05:15:50.862617033Z I0224 05:15:50.862584 1 base_controller.go:123] Shutting down worker of etcd controller ... 2026-02-24T05:15:50.862617033Z I0224 05:15:50.862608 1 base_controller.go:113] All etcd workers have been terminated 2026-02-24T05:15:50.862672054Z I0224 05:15:50.862643 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2026-02-24T05:15:50.862672054Z I0224 05:15:50.862657 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2026-02-24T05:15:50.862871870Z E0224 05:15:50.862834 1 base_controller.go:279] "Unhandled Error" err="etcd-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-02-24T05:15:50.862952472Z E0224 05:15:50.862903 1 base_controller.go:279] "Unhandled Error" err="ScriptController reconciliation failed: \"configmap/etcd-pod\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-scripts\": context canceled" 2026-02-24T05:15:50.863114516Z I0224 05:15:50.862994 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"0a351a28-85ae-4f0a-9e5a-20503ad688cb", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ScriptControllerErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2026-02-24T05:15:50.863209259Z I0224 05:15:50.863169 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-02-24T05:15:50.863209259Z I0224 05:15:50.863194 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-02-24T05:15:50.863209259Z I0224 05:15:50.863204 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-02-24T05:15:50.863693602Z E0224 05:15:50.863639 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-02-24T05:15:50.864631649Z E0224 05:15:50.864551 1 base_controller.go:279] "Unhandled Error" err="etcd-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"etcd-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-02-24T05:15:50.864750132Z I0224 05:15:50.864692 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-02-24T05:15:50.864750132Z I0224 05:15:50.864727 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-02-24T05:15:50.865105162Z I0224 05:15:50.865049 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-02-24T05:15:50.865105162Z I0224 05:15:50.865084 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-02-24T05:15:50.865123752Z E0224 05:15:50.865093 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-02-24T05:15:50.865140063Z I0224 05:15:50.865098 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-02-24T05:15:50.865160053Z I0224 05:15:50.865145 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-02-24T05:15:50.865223355Z I0224 05:15:50.865170 1 base_controller.go:113] All ScriptController workers have been terminated 2026-02-24T05:15:50.865784551Z I0224 05:15:50.865690 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-02-24T05:15:50.865784551Z I0224 05:15:50.865738 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-02-24T05:15:50.865784551Z I0224 05:15:50.865752 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-02-24T05:15:50.866616313Z I0224 05:15:50.866546 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-02-24T05:15:50.866643104Z I0224 05:15:50.866602 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-02-24T05:15:50.866643104Z I0224 05:15:50.866619 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-02-24T05:15:50.867664123Z E0224 05:15:50.867596 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd\": context canceled, \"etcd/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/minimal-sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-02-24T05:15:50.869549825Z I0224 05:15:50.869489 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-02-24T05:15:50.869549825Z I0224 05:15:50.869518 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-02-24T05:15:51.380999987Z I0224 05:15:51.380888 1 etcdcli_pool.go:70] creating a new cached client 2026-02-24T05:15:51.382027675Z I0224 05:15:51.381917 1 etcdcli_pool.go:70] creating a new cached client 2026-02-24T05:15:51.882053619Z I0224 05:15:51.881932 1 etcdcli_pool.go:70] creating a new cached client 2026-02-24T05:15:52.183476270Z I0224 05:15:52.183349 1 etcdcli_pool.go:70] creating a new cached client 2026-02-24T05:15:55.656707751Z I0224 05:15:55.656602 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="54581d3b0378297f7a3ff784843cef018be4e732eda038c1c4b72d61eebb5e4a") 2026-02-24T05:15:55.656707751Z I0224 05:15:55.656667 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2026-02-24T05:15:55.656798924Z I0224 05:15:55.656761 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="82a025196504427572268b1437a2fcb28125d0eacac9877cf5bc4ffe8740df2a") 2026-02-24T05:15:55.656798924Z I0224 05:15:55.656782 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2026-02-24T05:15:55.656901087Z I0224 05:15:55.656854 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="edb0149620b941e3deadf3cc2ea2e893efceb96664a5b4df70785dffc025820c") 2026-02-24T05:15:55.656901087Z I0224 05:15:55.656875 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2026-02-24T05:15:55.656985569Z I0224 05:15:55.656949 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="27d4a93b9ce341978a7391768ef68751fe103bf7a9e5e9c80cf9d46cb3f6f8a7") 2026-02-24T05:15:55.656985569Z I0224 05:15:55.656969 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2026-02-24T05:15:55.657056581Z I0224 05:15:55.657028 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="80d3c0fc89c335195c8b9bf5966eb9364517846c8dd1bc7efb5678088d8795c9") 2026-02-24T05:15:55.657056581Z I0224 05:15:55.657043 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2026-02-24T05:15:55.657143574Z I0224 05:15:55.657105 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="7f0d8d558c1476d74d8224e4e74e55682271acb41c72b7fa1e1551dc7528b60d") 2026-02-24T05:15:55.657143574Z I0224 05:15:55.657125 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2026-02-24T05:15:55.858771318Z I0224 05:15:55.858679 1 observer_polling.go:162] Shutting down file observer 2026-02-24T05:16:05.324783769Z W0224 05:16:05.324646 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-24T05:16:06.382403629Z W0224 05:16:06.382262 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-24T05:16:06.382900404Z E0224 05:16:06.382849 1 base_controller.go:279] "Unhandled Error" err="EtcdEndpointsController reconciliation failed: failed to get member list: giving up getting a cached client after 3 tries" 2026-02-24T05:16:06.383136541Z W0224 05:16:06.383091 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-24T05:16:06.384380860Z I0224 05:16:06.384276 1 base_controller.go:123] Shutting down worker of EtcdEndpointsController controller ... 2026-02-24T05:16:06.384398820Z I0224 05:16:06.384386 1 base_controller.go:113] All EtcdEndpointsController workers have been terminated 2026-02-24T05:16:06.883464112Z W0224 05:16:06.883338 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-24T05:16:07.184750947Z W0224 05:16:07.184602 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-24T05:16:07.187225093Z E0224 05:16:07.187149 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberRemovalController reconciliation failed: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries" 2026-02-24T05:16:07.188571774Z I0224 05:16:07.188492 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-02-24T05:16:07.188602955Z I0224 05:16:07.188577 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-02-24T05:16:09.326049802Z I0224 05:16:09.325888 1 etcdcli_pool.go:70] creating a new cached client 2026-02-24T05:16:10.383644820Z I0224 05:16:10.383541 1 etcdcli_pool.go:70] creating a new cached client 2026-02-24T05:16:10.884138706Z I0224 05:16:10.884058 1 etcdcli_pool.go:70] creating a new cached client 2026-02-24T05:16:24.330764387Z W0224 05:16:24.330630 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-02-24T05:16:24.331285723Z E0224 05:16:24.331217 1 base_controller.go:279] "Unhandled Error" err="EtcdMembersController reconciliation failed: giving up getting a cached client after 3 tries" 2026-02-24T05:16:24.332748658Z I0224 05:16:24.332661 1 base_controller.go:123] Shutting down worker of EtcdMembersController controller ... 2026-02-24T05:16:24.332777119Z I0224 05:16:24.332753 1 base_controller.go:113] All EtcdMembersController workers have been terminated 2026-02-24T05:16:24.870961785Z E0224 05:16:24.870885 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{etcd-operator.189716e4ec16c71b openshift-etcd-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-etcd-operator,Name:etcd-operator,UID:0a351a28-85ae-4f0a-9e5a-20503ad688cb,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:ScriptControllerErrorUpdatingStatus,Message:client rate limiter Wait returned an error: context canceled,Source:EventSource{Component:openshift-cluster-etcd-operator-script-controller-scriptcontroller,Host:,},FirstTimestamp:2026-02-24 05:15:50.862849819 +0000 UTC m=+75.269860373,LastTimestamp:2026-02-24 05:15:50.862849819 +0000 UTC m=+75.269860373,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:openshift-cluster-etcd-operator-script-controller-scriptcontroller,ReportingInstance:,}" 2026-02-24T05:16:24.870961785Z E0224 05:16:24.870918 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-24T05:16:24.871002876Z W0224 05:16:24.870985 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-tfmbs.json0000640000000000000000000001575615147232357024237 0ustar0000000000000000{"metadata":{"name":"etcd-operator-545bf96f4d-tfmbs","generateName":"etcd-operator-545bf96f4d-","namespace":"openshift-etcd-operator","uid":"7a2c651d-ea1a-41f2-9745-04adc8d88904","resourceVersion":"8373","creationTimestamp":"2026-02-24T05:13:09Z","labels":{"app":"etcd-operator","pod-template-hash":"545bf96f4d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-545bf96f4d","uid":"34d86bde-1b38-4455-8872-44c16ee1ae93","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-fgf94","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.33"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-fgf94","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:26Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:26Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2026-02-24T05:14:23Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-02-24T05:17:43Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-24T05:14:35Z","finishedAt":"2026-02-24T05:16:24Z","containerID":"cri-o://1fe643ed33a9f72192d56893c5e0183a5530b52d1fd5cb43d00c8adaabb5837c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","containerID":"cri-o://5b9fbeb4c761c7177b525ed4d8c68cf8e069fca30c46bcfac1010c8ec65d4d07","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-fgf94","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002746115147232357034124 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-fdc9d7cdd-8v72m2026-02-24T05:15:19.513628393Z W0224 05:15:19.513420 1 cmd.go:257] Using insecure, self-signed certificates 2026-02-24T05:15:19.514041066Z I0224 05:15:19.513981 1 crypto.go:601] Generating new CA for check-endpoints-signer@1771910119 cert, and key in /tmp/serving-cert-2522460096/serving-signer.crt, /tmp/serving-cert-2522460096/serving-signer.key 2026-02-24T05:15:19.898159006Z I0224 05:15:19.898079 1 observer_polling.go:159] Starting file observer 2026-02-24T05:15:19.917041121Z I0224 05:15:19.916954 1 builder.go:304] check-endpoints version 4.18.0-202601302238.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-24T05:15:19.917979817Z I0224 05:15:19.917923 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-2522460096/tls.crt::/tmp/serving-cert-2522460096/tls.key" 2026-02-24T05:15:20.621870409Z I0224 05:15:20.621780 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-24T05:15:20.623830354Z I0224 05:15:20.623793 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-24T05:15:20.626566920Z I0224 05:15:20.626509 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-24T05:15:20.626613422Z I0224 05:15:20.626593 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-24T05:15:20.626622152Z I0224 05:15:20.626612 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-24T05:15:20.637134304Z I0224 05:15:20.637064 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-24T05:15:20.637134304Z I0224 05:15:20.637077 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-24T05:15:20.637134304Z W0224 05:15:20.637100 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-24T05:15:20.637134304Z W0224 05:15:20.637108 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-24T05:15:20.637134304Z W0224 05:15:20.637115 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-24T05:15:20.637134304Z W0224 05:15:20.637119 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-24T05:15:20.637134304Z W0224 05:15:20.637123 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-24T05:15:20.637134304Z W0224 05:15:20.637127 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-24T05:15:20.641987089Z I0224 05:15:20.641926 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2522460096/tls.crt::/tmp/serving-cert-2522460096/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771910119\" (2026-02-24 05:15:18 +0000 UTC to 2026-03-26 05:15:19 +0000 UTC (now=2026-02-24 05:15:20.641881356 +0000 UTC))" 2026-02-24T05:15:20.642116482Z I0224 05:15:20.642090 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771910120\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771910120\" (2026-02-24 04:15:19 +0000 UTC to 2027-02-24 04:15:19 +0000 UTC (now=2026-02-24 05:15:20.642063491 +0000 UTC))" 2026-02-24T05:15:20.642125352Z I0224 05:15:20.642119 1 secure_serving.go:213] Serving securely on [::]:17698 2026-02-24T05:15:20.642202535Z I0224 05:15:20.642179 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-24T05:15:20.642232185Z I0224 05:15:20.642212 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-24T05:15:20.642264926Z I0224 05:15:20.642248 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-24T05:15:20.642330438Z I0224 05:15:20.642287 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-2522460096/tls.crt::/tmp/serving-cert-2522460096/tls.key" 2026-02-24T05:15:20.642555044Z I0224 05:15:20.642527 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-24T05:15:20.642709028Z I0224 05:15:20.642679 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-24T05:15:20.642709028Z I0224 05:15:20.642695 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-24T05:15:20.642720090Z I0224 05:15:20.642711 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-24T05:15:20.642728990Z I0224 05:15:20.642717 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-24T05:15:20.642821113Z I0224 05:15:20.642794 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-24T05:15:20.642821113Z I0224 05:15:20.642808 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-24T05:15:20.648814769Z I0224 05:15:20.648707 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:15:20.649490298Z I0224 05:15:20.649464 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:15:20.652623965Z I0224 05:15:20.652584 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:15:20.674411041Z I0224 05:15:20.670866 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-02-24T05:15:20.744409087Z I0224 05:15:20.744198 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-24T05:15:20.744409087Z I0224 05:15:20.744350 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-24T05:15:20.744472179Z I0224 05:15:20.744457 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-24T05:15:20.748343996Z I0224 05:15:20.744654 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-24 05:04:31 +0000 UTC to 2026-02-25 05:04:31 +0000 UTC (now=2026-02-24 05:15:20.744613183 +0000 UTC))" 2026-02-24T05:15:20.748343996Z I0224 05:15:20.744804 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2522460096/tls.crt::/tmp/serving-cert-2522460096/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771910119\" (2026-02-24 05:15:18 +0000 UTC to 2026-03-26 05:15:19 +0000 UTC (now=2026-02-24 05:15:20.744788667 +0000 UTC))" 2026-02-24T05:15:20.748343996Z I0224 05:15:20.744927 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771910120\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771910120\" (2026-02-24 04:15:19 +0000 UTC to 2027-02-24 04:15:19 +0000 UTC (now=2026-02-24 05:15:20.744912041 +0000 UTC))" 2026-02-24T05:15:20.748343996Z I0224 05:15:20.745215 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-24 04:58:17 +0000 UTC to 2036-02-22 04:58:17 +0000 UTC (now=2026-02-24 05:15:20.745196069 +0000 UTC))" 2026-02-24T05:15:20.748343996Z I0224 05:15:20.745728 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-24 05:04:32 +0000 UTC to 2026-02-25 05:04:32 +0000 UTC (now=2026-02-24 05:15:20.745711323 +0000 UTC))" 2026-02-24T05:15:20.748343996Z I0224 05:15:20.745754 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-24 05:04:32 +0000 UTC to 2027-02-24 05:04:32 +0000 UTC (now=2026-02-24 05:15:20.745745014 +0000 UTC))" 2026-02-24T05:15:20.748343996Z I0224 05:15:20.745768 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-24 05:04:33 +0000 UTC to 2027-02-24 05:04:33 +0000 UTC (now=2026-02-24 05:15:20.745759194 +0000 UTC))" 2026-02-24T05:15:20.748343996Z I0224 05:15:20.745780 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-24 05:04:30 +0000 UTC to 2036-02-22 05:04:30 +0000 UTC (now=2026-02-24 05:15:20.745771934 +0000 UTC))" 2026-02-24T05:15:20.748343996Z I0224 05:15:20.745793 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-24 05:04:31 +0000 UTC to 2026-02-25 05:04:31 +0000 UTC (now=2026-02-24 05:15:20.745785355 +0000 UTC))" 2026-02-24T05:15:20.748343996Z I0224 05:15:20.745898 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2522460096/tls.crt::/tmp/serving-cert-2522460096/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771910119\" (2026-02-24 05:15:18 +0000 UTC to 2026-03-26 05:15:19 +0000 UTC (now=2026-02-24 05:15:20.745887648 +0000 UTC))" 2026-02-24T05:15:20.748343996Z I0224 05:15:20.745999 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771910120\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771910120\" (2026-02-24 04:15:19 +0000 UTC to 2027-02-24 04:15:19 +0000 UTC (now=2026-02-24 05:15:20.74598903 +0000 UTC))" 2026-02-24T05:15:21.035192023Z I0224 05:15:21.035107 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:15:21.071112731Z I0224 05:15:21.071034 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-02-24T05:15:21.071112731Z I0224 05:15:21.071064 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-fdc9d7cdd-8v72m/openshift-apiserver_current.log0000640000000000000000000011253415147232357031123 0ustar00000000000000002026-02-24T05:19:05.356642260Z E0224 05:19:05.356627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:07.952584084Z I0224 05:19:07.952496 1 policy_source.go:224] refreshing policies 2026-02-24T05:19:08.952868069Z I0224 05:19:08.952806 1 policy_source.go:224] refreshing policies 2026-02-24T05:19:15.152198283Z E0224 05:19:15.150008 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.150739 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.150814 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.151134 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.151285 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.151336 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.151569 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.151624 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.151730 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.151767 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.151781 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.151893 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.151951 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.151988 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.152055 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.152097 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.152138 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152198283Z E0224 05:19:15.152166 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152321696Z E0224 05:19:15.152239 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.152321696Z E0224 05:19:15.152266 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.155766195Z E0224 05:19:15.152298 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.155889738Z http2: server: error reading preface from client 10.128.0.2:49310: read tcp 10.128.0.35:8443->10.128.0.2:49310: read: connection reset by peer 2026-02-24T05:19:15.156046122Z E0224 05:19:15.152436 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.156197116Z http2: server: error reading preface from client 10.128.0.2:49424: read tcp 10.128.0.35:8443->10.128.0.2:49424: read: connection reset by peer 2026-02-24T05:19:15.156258818Z E0224 05:19:15.152523 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.156441502Z E0224 05:19:15.152547 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.156560935Z E0224 05:19:15.156521 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.156641657Z E0224 05:19:15.156599 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.156720519Z E0224 05:19:15.152565 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.156823872Z E0224 05:19:15.156789 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.156823872Z E0224 05:19:15.156815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.156881394Z E0224 05:19:15.154774 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.156985086Z E0224 05:19:15.154847 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.157097299Z E0224 05:19:15.154893 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.157193331Z E0224 05:19:15.155237 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.157281804Z E0224 05:19:15.155292 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.157356326Z E0224 05:19:15.156846 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.163891984Z E0224 05:19:15.163852 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.164134630Z E0224 05:19:15.164105 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.164342406Z E0224 05:19:15.164293 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.164488039Z E0224 05:19:15.164454 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.164584482Z E0224 05:19:15.164560 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.164786227Z E0224 05:19:15.164748 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.164867999Z E0224 05:19:15.164833 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.164867999Z E0224 05:19:15.164852 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.165012553Z E0224 05:19:15.164978 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.165125405Z E0224 05:19:15.165083 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:16.242731520Z E0224 05:19:16.240903 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:16.242731520Z E0224 05:19:16.241012 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:16.242731520Z E0224 05:19:16.241147 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:16.242731520Z E0224 05:19:16.241437 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:16.246148728Z E0224 05:19:16.246096 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:16.291337709Z E0224 05:19:16.291260 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:16.291436992Z E0224 05:19:16.291396 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:16.291482603Z E0224 05:19:16.291440 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:16.291526724Z E0224 05:19:16.291489 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:16.291566375Z E0224 05:19:16.291423 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.237717152Z E0224 05:19:17.237654 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.237717152Z E0224 05:19:17.237701 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.237756163Z E0224 05:19:17.237717 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.237835825Z E0224 05:19:17.237654 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.237835825Z E0224 05:19:17.237801 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.237877566Z E0224 05:19:17.237860 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.237930987Z E0224 05:19:17.237652 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.237984909Z E0224 05:19:17.237940 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.237984909Z E0224 05:19:17.237973 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.238045840Z E0224 05:19:17.237868 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.245722588Z E0224 05:19:17.245678 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.246140908Z E0224 05:19:17.246103 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.246476817Z E0224 05:19:17.246431 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.246783315Z E0224 05:19:17.246745 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:17.247055481Z E0224 05:19:17.247016 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:18.215899201Z E0224 05:19:18.215837 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:18.215962613Z E0224 05:19:18.215925 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:18.216240940Z E0224 05:19:18.216195 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:18.216336472Z E0224 05:19:18.216293 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:18.216501856Z E0224 05:19:18.216210 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:18.218821376Z E0224 05:19:18.218787 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:19.231714918Z E0224 05:19:19.229276 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:19.231714918Z E0224 05:19:19.229399 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:19.231714918Z E0224 05:19:19.229436 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:19.231714918Z E0224 05:19:19.229536 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:22.969016798Z I0224 05:19:22.968926 1 policy_source.go:224] refreshing policies 2026-02-24T05:19:23.969255404Z I0224 05:19:23.969181 1 policy_source.go:224] refreshing policies 2026-02-24T05:19:24.011282934Z I0224 05:19:24.011149 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-02-24T05:19:24.013284706Z I0224 05:19:24.013237 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:19:35.370893638Z E0224 05:19:35.370791 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:35.370893638Z E0224 05:19:35.370827 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:35.371188436Z E0224 05:19:35.371058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:35.371188436Z E0224 05:19:35.371112 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:35.371421692Z E0224 05:19:35.371272 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:35.371508714Z E0224 05:19:35.371459 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:35.371508714Z E0224 05:19:35.371496 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:35.371692818Z E0224 05:19:35.371646 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:35.371939575Z E0224 05:19:35.371882 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:35.372004216Z E0224 05:19:35.371886 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:35.373768082Z http2: server: error reading preface from client 10.128.0.2:59642: read tcp 10.128.0.35:8443->10.128.0.2:59642: read: connection reset by peer openshift-apiserver-operator_current.log0000640000000000000000000005517715147232357040404 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-8586dccc9b-49fsv2026-02-24T05:19:04.447374730Z > 2026-02-24T05:19:06.649394658Z E0224 05:19:06.647323 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:06.649394658Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-24T05:19:06.649394658Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-24T05:19:06.649394658Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-24T05:19:06.649394658Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-24T05:19:06.649394658Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-24T05:19:06.649394658Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-24T05:19:06.649394658Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-24T05:19:06.649394658Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-24T05:19:06.649394658Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-24T05:19:06.649394658Z > 2026-02-24T05:19:08.207884264Z E0224 05:19:08.207782 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:08.207884264Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-24T05:19:08.207884264Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-24T05:19:08.207884264Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-24T05:19:08.207884264Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-24T05:19:08.207884264Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-24T05:19:08.207884264Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-24T05:19:08.207884264Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-24T05:19:08.207884264Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-24T05:19:08.207884264Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-24T05:19:08.207884264Z > 2026-02-24T05:19:10.004122397Z E0224 05:19:10.004010 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:10.004122397Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-24T05:19:10.004122397Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-24T05:19:10.004122397Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-24T05:19:10.004122397Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-24T05:19:10.004122397Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-24T05:19:10.004122397Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-24T05:19:10.004122397Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-24T05:19:10.004122397Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-24T05:19:10.004122397Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-24T05:19:10.004122397Z > 2026-02-24T05:19:13.668169534Z E0224 05:19:13.668035 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:13.668169534Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-24T05:19:13.668169534Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-24T05:19:13.668169534Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-24T05:19:13.668169534Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-24T05:19:13.668169534Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-24T05:19:13.668169534Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-24T05:19:13.668169534Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-24T05:19:13.668169534Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-24T05:19:13.668169534Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-24T05:19:13.668169534Z > 2026-02-24T05:19:17.723137367Z E0224 05:19:17.723031 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:17.723137367Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-24T05:19:17.723137367Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-24T05:19:17.723137367Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-24T05:19:17.723137367Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-24T05:19:17.723137367Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-24T05:19:17.723137367Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-24T05:19:17.723137367Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-24T05:19:17.723137367Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-24T05:19:17.723137367Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-24T05:19:17.723137367Z > 2026-02-24T05:19:20.037488746Z I0224 05:19:20.036804 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-24T05:19:21.033359551Z E0224 05:19:21.032591 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:21.033359551Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-24T05:19:21.033359551Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-24T05:19:21.033359551Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-24T05:19:21.033359551Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-24T05:19:21.033359551Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-24T05:19:21.033359551Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-24T05:19:21.033359551Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-24T05:19:21.033359551Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-24T05:19:21.033359551Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-24T05:19:21.033359551Z > 2026-02-24T05:19:21.869863309Z I0224 05:19:21.869797 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-24T05:19:25.249283581Z I0224 05:19:25.249203 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-24T05:19:26.086454707Z I0224 05:19:26.086360 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-24T05:19:26.121079696Z I0224 05:19:26.120879 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-24T05:19:26.141113011Z I0224 05:19:26.141018 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-24T05:19:27.285596825Z I0224 05:19:27.284906 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-24T05:19:27.722016260Z E0224 05:19:27.721884 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:27.722016260Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-24T05:19:27.722016260Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-24T05:19:27.722016260Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-24T05:19:27.722016260Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-24T05:19:27.722016260Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-24T05:19:27.722016260Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-24T05:19:27.722016260Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-24T05:19:27.722016260Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-24T05:19:27.722016260Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-24T05:19:27.722016260Z > 2026-02-24T05:19:30.068304570Z I0224 05:19:30.068205 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-24T05:19:30.092907733Z E0224 05:19:30.092801 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:30.092907733Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401 2026-02-24T05:19:30.092907733Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401 2026-02-24T05:19:30.092907733Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401 2026-02-24T05:19:30.092907733Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401 2026-02-24T05:19:30.092907733Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401 2026-02-24T05:19:30.092907733Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401 2026-02-24T05:19:30.092907733Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401 2026-02-24T05:19:30.092907733Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401 2026-02-24T05:19:30.092907733Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401 2026-02-24T05:19:30.092907733Z > 2026-02-24T05:19:30.183436439Z I0224 05:19:30.183178 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-24T05:19:32.875298090Z I0224 05:19:32.874679 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. 2026-02-24T05:19:38.145434505Z I0224 05:19:38.144932 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.33) to be completed. kube-scheduler-operator-container_current.log0000640000000000000000000015365015147232357042753 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-77cd4d9559-8l7xv2026-02-24T05:18:46.621882969Z }, 2026-02-24T05:18:46.621882969Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-02-24T05:18:46.621882969Z (string) (len=18) "kube-scheduler-pod", 2026-02-24T05:18:46.621882969Z (string) (len=6) "config", 2026-02-24T05:18:46.621882969Z (string) (len=17) "serviceaccount-ca", 2026-02-24T05:18:46.621882969Z (string) (len=20) "scheduler-kubeconfig", 2026-02-24T05:18:46.621882969Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-02-24T05:18:46.621882969Z }, 2026-02-24T05:18:46.621882969Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-24T05:18:46.621882969Z (string) (len=16) "policy-configmap" 2026-02-24T05:18:46.621882969Z }, 2026-02-24T05:18:46.621882969Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-02-24T05:18:46.621882969Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-02-24T05:18:46.621882969Z }, 2026-02-24T05:18:46.621882969Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-24T05:18:46.621882969Z CertConfigMapNamePrefixes: ([]string) , 2026-02-24T05:18:46.621882969Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-02-24T05:18:46.621882969Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-02-24T05:18:46.621882969Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-24T05:18:46.621882969Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-24T05:18:46.621882969Z Timeout: (time.Duration) 2m0s, 2026-02-24T05:18:46.621882969Z StaticPodManifestsLockFile: (string) "", 2026-02-24T05:18:46.621882969Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-24T05:18:46.621882969Z KubeletVersion: (string) "" 2026-02-24T05:18:46.621882969Z }) 2026-02-24T05:18:46.621882969Z I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0 2026-02-24T05:18:46.621882969Z I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-24T05:18:46.621882969Z I0224 05:15:12.083331 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-24T05:18:46.621882969Z I0224 05:15:12.083349 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-24T05:18:46.621882969Z I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-24T05:18:46.621882969Z I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0 2026-02-24T05:18:46.621882969Z F0224 05:15:56.100613 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:18:46.622633619Z I0224 05:18:46.622193 1 prune_controller.go:277] Nothing to prune 2026-02-24T05:18:46.623146004Z I0224 05:18:46.623060 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' installer errors: installer: s: ([]string) (len=1 cap=1) { 2026-02-24T05:18:46.623146004Z (string) (len=31) "localhost-recovery-client-token" 2026-02-24T05:18:46.623146004Z }, 2026-02-24T05:18:46.623146004Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-24T05:18:46.623146004Z (string) (len=12) "serving-cert" 2026-02-24T05:18:46.623146004Z }, 2026-02-24T05:18:46.623146004Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-02-24T05:18:46.623146004Z (string) (len=18) "kube-scheduler-pod", 2026-02-24T05:18:46.623146004Z (string) (len=6) "config", 2026-02-24T05:18:46.623146004Z (string) (len=17) "serviceaccount-ca", 2026-02-24T05:18:46.623146004Z (string) (len=20) "scheduler-kubeconfig", 2026-02-24T05:18:46.623146004Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-02-24T05:18:46.623146004Z }, 2026-02-24T05:18:46.623146004Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-24T05:18:46.623146004Z (string) (len=16) "policy-configmap" 2026-02-24T05:18:46.623146004Z }, 2026-02-24T05:18:46.623146004Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-02-24T05:18:46.623146004Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-02-24T05:18:46.623146004Z }, 2026-02-24T05:18:46.623146004Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-24T05:18:46.623146004Z CertConfigMapNamePrefixes: ([]string) , 2026-02-24T05:18:46.623146004Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-02-24T05:18:46.623146004Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-02-24T05:18:46.623146004Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-24T05:18:46.623146004Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-24T05:18:46.623146004Z Timeout: (time.Duration) 2m0s, 2026-02-24T05:18:46.623146004Z StaticPodManifestsLockFile: (string) "", 2026-02-24T05:18:46.623146004Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-24T05:18:46.623146004Z KubeletVersion: (string) "" 2026-02-24T05:18:46.623146004Z }) 2026-02-24T05:18:46.623146004Z I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0 2026-02-24T05:18:46.623146004Z I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-24T05:18:46.623146004Z I0224 05:15:12.083331 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-24T05:18:46.623146004Z I0224 05:15:12.083349 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-24T05:18:46.623146004Z I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-24T05:18:46.623146004Z I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0 2026-02-24T05:18:46.623146004Z F0224 05:15:56.100613 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:18:46.623418151Z I0224 05:18:46.623357 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"NodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap/serviceaccount-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\nTargetConfigControllerDegraded: \"serviceaccount/localhost-recovery-client\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:15:06Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-24T05:18:46.623585985Z W0224 05:18:46.623531 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-24T05:18:46.623585985Z W0224 05:18:46.623560 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-24T05:18:46.623585985Z W0224 05:18:46.623568 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-24T05:18:46.637194267Z I0224 05:18:46.637117 1 prune_controller.go:277] Nothing to prune 2026-02-24T05:18:46.637403973Z E0224 05:18:46.637361 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa), \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery), \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)]" 2026-02-24T05:18:46.637613448Z I0224 05:18:46.637560 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "NodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap/serviceaccount-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\nTargetConfigControllerDegraded: \"serviceaccount/localhost-recovery-client\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)" 2026-02-24T05:18:46.638488391Z I0224 05:18:46.638431 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeControllerManagerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/serviceaccount-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\nTargetConfigControllerDegraded: \"serviceaccount/localhost-recovery-client\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:15:06Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-24T05:18:46.652587316Z I0224 05:18:46.652462 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nTargetConfigControllerDegraded: \"configmap/serviceaccount-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\nTargetConfigControllerDegraded: \"serviceaccount/localhost-recovery-client\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)" to "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeControllerManagerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/serviceaccount-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\nTargetConfigControllerDegraded: \"serviceaccount/localhost-recovery-client\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)" 2026-02-24T05:18:46.669843495Z I0224 05:18:46.669545 1 prune_controller.go:277] Nothing to prune 2026-02-24T05:18:46.670424080Z I0224 05:18:46.670367 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=31) \"localhost-recovery-client-token\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"serving-cert\"\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\nNodeInstallerDegraded: (string) (len=18) \"kube-scheduler-pod\",\nNodeInstallerDegraded: (string) (len=6) \"config\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=20) \"scheduler-kubeconfig\",\nNodeInstallerDegraded: (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=16) \"policy-configmap\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=30) \"kube-scheduler-client-cert-key\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeControllerManagerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/serviceaccount-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\nTargetConfigControllerDegraded: \"serviceaccount/localhost-recovery-client\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:15:06Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-24T05:18:46.688152652Z I0224 05:18:46.686268 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeControllerManagerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/serviceaccount-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\nTargetConfigControllerDegraded: \"serviceaccount/localhost-recovery-client\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)" to "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=31) \"localhost-recovery-client-token\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"serving-cert\"\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\nNodeInstallerDegraded: (string) (len=18) \"kube-scheduler-pod\",\nNodeInstallerDegraded: (string) (len=6) \"config\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=20) \"scheduler-kubeconfig\",\nNodeInstallerDegraded: (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=16) \"policy-configmap\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=30) \"kube-scheduler-client-cert-key\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) ,\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeControllerManagerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/serviceaccount-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\nTargetConfigControllerDegraded: \"serviceaccount/localhost-recovery-client\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)" 2026-02-24T05:18:47.839627963Z I0224 05:18:47.839538 1 prune_controller.go:277] Nothing to prune 2026-02-24T05:18:47.842827248Z I0224 05:18:47.842560 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=31) \"localhost-recovery-client-token\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"serving-cert\"\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\nNodeInstallerDegraded: (string) (len=18) \"kube-scheduler-pod\",\nNodeInstallerDegraded: (string) (len=6) \"config\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=20) \"scheduler-kubeconfig\",\nNodeInstallerDegraded: (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=16) \"policy-configmap\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=30) \"kube-scheduler-client-cert-key\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeControllerManagerStaticResourcesDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:15:06Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-24T05:18:47.860341034Z I0224 05:18:47.860221 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=31) \"localhost-recovery-client-token\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"serving-cert\"\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\nNodeInstallerDegraded: (string) (len=18) \"kube-scheduler-pod\",\nNodeInstallerDegraded: (string) (len=6) \"config\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=20) \"scheduler-kubeconfig\",\nNodeInstallerDegraded: (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=16) \"policy-configmap\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=30) \"kube-scheduler-client-cert-key\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) ,\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeControllerManagerStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/serviceaccount-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\nTargetConfigControllerDegraded: \"serviceaccount/localhost-recovery-client\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)" to "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=31) \"localhost-recovery-client-token\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"serving-cert\"\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\nNodeInstallerDegraded: (string) (len=18) \"kube-scheduler-pod\",\nNodeInstallerDegraded: (string) (len=6) \"config\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=20) \"scheduler-kubeconfig\",\nNodeInstallerDegraded: (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=16) \"policy-configmap\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=30) \"kube-scheduler-client-cert-key\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) ,\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeControllerManagerStaticResourcesDegraded: " 2026-02-24T05:18:49.618701565Z W0224 05:18:49.618546 1 dynamic_operator_client.go:355] .status.conditions["KubeControllerManagerStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-02-24T05:18:49.649443342Z I0224 05:18:49.649137 1 prune_controller.go:277] Nothing to prune 2026-02-24T05:18:49.651020374Z I0224 05:18:49.650911 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=31) \"localhost-recovery-client-token\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"serving-cert\"\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\nNodeInstallerDegraded: (string) (len=18) \"kube-scheduler-pod\",\nNodeInstallerDegraded: (string) (len=6) \"config\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=20) \"scheduler-kubeconfig\",\nNodeInstallerDegraded: (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=16) \"policy-configmap\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=30) \"kube-scheduler-client-cert-key\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:15:06Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-24T05:18:49.663830355Z I0224 05:18:49.663701 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=31) \"localhost-recovery-client-token\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"serving-cert\"\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\nNodeInstallerDegraded: (string) (len=18) \"kube-scheduler-pod\",\nNodeInstallerDegraded: (string) (len=6) \"config\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=20) \"scheduler-kubeconfig\",\nNodeInstallerDegraded: (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=16) \"policy-configmap\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=30) \"kube-scheduler-client-cert-key\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) ,\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\nKubeControllerManagerStaticResourcesDegraded: \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\nKubeControllerManagerStaticResourcesDegraded: " to "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=31) \"localhost-recovery-client-token\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"serving-cert\"\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\nNodeInstallerDegraded: (string) (len=18) \"kube-scheduler-pod\",\nNodeInstallerDegraded: (string) (len=6) \"config\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=20) \"scheduler-kubeconfig\",\nNodeInstallerDegraded: (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=16) \"policy-configmap\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=30) \"kube-scheduler-client-cert-key\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) ,\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: " 2026-02-24T05:19:01.016767219Z I0224 05:19:01.016585 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-1-retry-1-master-0 -n openshift-kube-scheduler because it was missing 2026-02-24T05:19:01.022829490Z I0224 05:19:01.022624 1 installer_controller.go:550] "master-0" is in transition to 1, but has not made progress because installer is not finished, but in Pending phase 2026-02-24T05:19:02.221168597Z I0224 05:19:02.221098 1 installer_controller.go:550] "master-0" is in transition to 1, but has not made progress because installer is not finished, but in Pending phase 2026-02-24T05:19:03.022376715Z I0224 05:19:03.020551 1 installer_controller.go:550] "master-0" is in transition to 1, but has not made progress because installer is not finished, but in Pending phase 2026-02-24T05:19:03.815783494Z I0224 05:19:03.815715 1 installer_controller.go:550] "master-0" is in transition to 1, but has not made progress because installer is not finished, but in Running phase 2026-02-24T05:19:37.593581592Z I0224 05:19:37.593444 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-scheduler version "operator" changed from "" to "4.18.33" 2026-02-24T05:19:37.593734796Z I0224 05:19:37.593701 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-scheduler version "kube-scheduler" changed from "" to "1.31.14" 2026-02-24T05:19:37.594682511Z I0224 05:19:37.594383 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"versions":[{"name":"raw-internal","version":"4.18.33"},{"name":"operator","version":"4.18.33"},{"name":"kube-scheduler","version":"1.31.14"}]}} 2026-02-24T05:19:38.151398438Z I0224 05:19:38.150695 1 installer_controller.go:550] "master-0" is in transition to 1, but has not made progress because installer is not finished, but in Running phase 2026-02-24T05:19:38.156237503Z I0224 05:19:38.154088 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: status.versions changed from [{"raw-internal" "4.18.33"}] to [{"raw-internal" "4.18.33"} {"operator" "4.18.33"} {"kube-scheduler" "1.31.14"}] kube-scheduler-operator-container_previous.log0000640000000000000000000006313615147232357043144 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-77cd4d9559-8l7xv2026-02-24T05:14:47.480940992Z E0224 05:14:47.480922 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]" 2026-02-24T05:14:47.854956693Z W0224 05:14:47.854515 1 dynamic_operator_client.go:352] .status.conditions["StaticPodsDegraded"].reason is missing; this will eventually be fatal 2026-02-24T05:14:47.854956693Z W0224 05:14:47.854904 1 dynamic_operator_client.go:355] .status.conditions["StaticPodsDegraded"].message is missing; this will eventually be fatal 2026-02-24T05:14:47.862807495Z I0224 05:14:47.862757 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RequiredInstallerResourcesMissing' configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0 2026-02-24T05:14:47.863492853Z E0224 05:14:47.863455 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]" 2026-02-24T05:14:48.048874591Z I0224 05:14:48.048791 1 request.go:700] Waited for 1.188158298s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller 2026-02-24T05:14:48.058298985Z W0224 05:14:48.058237 1 dynamic_operator_client.go:352] .status.conditions["InstallerPodContainerWaitingDegraded"].reason is missing; this will eventually be fatal 2026-02-24T05:14:48.058298985Z W0224 05:14:48.058254 1 dynamic_operator_client.go:355] .status.conditions["InstallerPodContainerWaitingDegraded"].message is missing; this will eventually be fatal 2026-02-24T05:14:48.058298985Z W0224 05:14:48.058259 1 dynamic_operator_client.go:352] .status.conditions["InstallerPodNetworkingDegraded"].reason is missing; this will eventually be fatal 2026-02-24T05:14:48.058298985Z W0224 05:14:48.058264 1 dynamic_operator_client.go:355] .status.conditions["InstallerPodNetworkingDegraded"].message is missing; this will eventually be fatal 2026-02-24T05:14:48.058298985Z W0224 05:14:48.058267 1 dynamic_operator_client.go:352] .status.conditions["InstallerPodPendingDegraded"].reason is missing; this will eventually be fatal 2026-02-24T05:14:48.058298985Z W0224 05:14:48.058271 1 dynamic_operator_client.go:355] .status.conditions["InstallerPodPendingDegraded"].message is missing; this will eventually be fatal 2026-02-24T05:14:48.074561653Z E0224 05:14:48.074497 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: configmap \"kube-scheduler-pod\" not found" 2026-02-24T05:14:48.255005337Z I0224 05:14:48.253835 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing 2026-02-24T05:14:48.263171557Z I0224 05:14:48.263105 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing 2026-02-24T05:14:48.264116232Z W0224 05:14:48.264085 1 dynamic_operator_client.go:355] .status.conditions["BackingResourceControllerDegraded"].message is missing; this will eventually be fatal 2026-02-24T05:14:48.274241485Z E0224 05:14:48.274202 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: configmap \"kube-scheduler-pod\" not found" 2026-02-24T05:14:48.456547099Z I0224 05:14:48.456446 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceUpdated' Updated Namespace/openshift-kube-scheduler because it changed 2026-02-24T05:14:48.469753025Z I0224 05:14:48.469659 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RequiredInstallerResourcesMissing' configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0 2026-02-24T05:14:48.470815834Z E0224 05:14:48.470789 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]" 2026-02-24T05:14:48.653045686Z I0224 05:14:48.652979 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/config -n openshift-kube-scheduler because it was missing 2026-02-24T05:14:48.654220488Z E0224 05:14:48.654201 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: configmap \"kube-scheduler-pod\" not found" 2026-02-24T05:14:48.673215779Z E0224 05:14:48.673153 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: configmap \"kube-scheduler-pod\" not found" 2026-02-24T05:14:48.864233199Z I0224 05:14:48.864105 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RequiredInstallerResourcesMissing' configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0 2026-02-24T05:14:48.864851755Z E0224 05:14:48.864768 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]" 2026-02-24T05:14:49.054957109Z I0224 05:14:49.054872 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing 2026-02-24T05:14:49.056557133Z E0224 05:14:49.055597 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: configmap \"kube-scheduler-pod\" not found" 2026-02-24T05:14:49.063686392Z I0224 05:14:49.063632 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RequiredInstallerResourcesMissing' configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0 2026-02-24T05:14:49.064708690Z E0224 05:14:49.064637 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]" 2026-02-24T05:14:49.067202259Z I0224 05:14:49.067136 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing 2026-02-24T05:14:49.075669074Z I0224 05:14:49.075610 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing 2026-02-24T05:14:49.084704075Z I0224 05:14:49.084609 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing 2026-02-24T05:14:49.167397955Z I0224 05:14:49.167293 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing 2026-02-24T05:14:49.265551995Z E0224 05:14:49.265456 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]" 2026-02-24T05:14:49.265551995Z I0224 05:14:49.265496 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RequiredInstallerResourcesMissing' configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0 2026-02-24T05:14:49.463815688Z E0224 05:14:49.463656 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]" 2026-02-24T05:14:49.463815688Z I0224 05:14:49.463724 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RequiredInstallerResourcesMissing' configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0 2026-02-24T05:14:49.555534877Z E0224 05:14:49.555458 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: configmap \"kube-scheduler-pod\" not found" 2026-02-24T05:14:49.663813448Z I0224 05:14:49.663706 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RequiredInstallerResourcesMissing' configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0 2026-02-24T05:14:49.665757583Z E0224 05:14:49.665700 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]" 2026-02-24T05:14:49.866941997Z E0224 05:14:49.866862 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]" 2026-02-24T05:14:49.867020069Z I0224 05:14:49.866942 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RequiredInstallerResourcesMissing' configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0 2026-02-24T05:14:50.057769833Z E0224 05:14:50.057684 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: configmap \"kube-scheduler-pod\" not found" 2026-02-24T05:14:50.058330319Z I0224 05:14:50.058272 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing 2026-02-24T05:14:50.064105699Z E0224 05:14:50.064074 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]" 2026-02-24T05:14:50.064129870Z I0224 05:14:50.064100 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RequiredInstallerResourcesMissing' configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0 2026-02-24T05:14:50.264446779Z E0224 05:14:50.264359 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]" 2026-02-24T05:14:50.264446779Z I0224 05:14:50.264395 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RequiredInstallerResourcesMissing' configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0 2026-02-24T05:14:50.335823964Z I0224 05:14:50.335202 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="82f0144dce825b71b374b1b6ec8ed4b6921c460db62c184a0a95334923dbc000") 2026-02-24T05:14:50.335823964Z W0224 05:14:50.335252 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-02-24T05:14:50.335823964Z I0224 05:14:50.335356 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="7c4995109abf51e8e4a6eee5bf7991d1153f1f6fbf427612073cf591184ecc3a") 2026-02-24T05:14:50.335900217Z I0224 05:14:50.335852 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-02-24T05:14:50.335900217Z I0224 05:14:50.335893 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-02-24T05:14:50.336224595Z I0224 05:14:50.336198 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-02-24T05:14:50.336295767Z I0224 05:14:50.336282 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-02-24T05:14:50.336351579Z I0224 05:14:50.336340 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-02-24T05:14:50.336644037Z I0224 05:14:50.336388 1 base_controller.go:181] Shutting down Installer ... 2026-02-24T05:14:50.336698018Z I0224 05:14:50.336675 1 base_controller.go:181] Shutting down GuardController ... 2026-02-24T05:14:50.336735969Z I0224 05:14:50.336725 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-02-24T05:14:50.336855633Z I0224 05:14:50.336843 1 base_controller.go:181] Shutting down RevisionController ... 2026-02-24T05:14:50.336895144Z I0224 05:14:50.336885 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-02-24T05:14:50.336929845Z I0224 05:14:50.336920 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-02-24T05:14:50.338859919Z E0224 05:14:50.338822 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-token.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-02-24T05:14:50.338935021Z I0224 05:14:50.338915 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ServiceCreateFailed' Failed to create Service/scheduler -n openshift-kube-scheduler: client rate limiter Wait returned an error: context canceled 2026-02-24T05:14:50.338989972Z I0224 05:14:50.338975 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"64315dcb-5b1b-44ce-9387-1e71a010b65a", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'SecretCreateFailed' Failed to create Secret/localhost-recovery-client-token -n openshift-kube-scheduler: client rate limiter Wait returned an error: context canceled 2026-02-24T05:14:50.339027723Z I0224 05:14:50.339017 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-02-24T05:14:50.339435295Z I0224 05:14:50.339383 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-02-24T05:14:50.339454715Z I0224 05:14:50.339435 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-02-24T05:14:50.339522557Z I0224 05:14:50.339502 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-02-24T05:14:50.339553978Z I0224 05:14:50.339537 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-02-24T05:14:50.339563378Z I0224 05:14:50.339554 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-02-24T05:14:50.339600949Z I0224 05:14:50.339583 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-24T05:14:50.339625030Z I0224 05:14:50.339608 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-24T05:14:50.339634010Z I0224 05:14:50.339628 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-02-24T05:14:50.340229197Z I0224 05:14:50.340189 1 base_controller.go:181] Shutting down PruneController ... 2026-02-24T05:14:50.340243348Z I0224 05:14:50.340227 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-02-24T05:14:50.340252438Z I0224 05:14:50.340244 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-02-24T05:14:50.342387507Z I0224 05:14:50.340250 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-298024176/tls.crt::/tmp/serving-cert-298024176/tls.key" 2026-02-24T05:14:50.342387507Z I0224 05:14:50.340328 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-02-24T05:14:50.342387507Z I0224 05:14:50.340339 1 base_controller.go:113] All GuardController workers have been terminated 2026-02-24T05:14:50.342387507Z I0224 05:14:50.340347 1 controller_manager.go:54] GuardController controller terminated 2026-02-24T05:14:50.342387507Z I0224 05:14:50.340382 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-02-24T05:14:50.342862390Z I0224 05:14:50.342818 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-02-24T05:14:50.342998604Z I0224 05:14:50.342967 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-02-24T05:14:50.342998604Z I0224 05:14:50.342744 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-02-24T05:14:50.343011065Z I0224 05:14:50.343001 1 base_controller.go:113] All Installer workers have been terminated 2026-02-24T05:14:50.343067276Z I0224 05:14:50.343012 1 controller_manager.go:54] Installer controller terminated 2026-02-24T05:14:50.343067276Z I0224 05:14:50.342732 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-02-24T05:14:50.343096297Z I0224 05:14:50.343074 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-02-24T05:14:50.343096297Z I0224 05:14:50.343089 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-02-24T05:14:50.343180709Z I0224 05:14:50.343156 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-02-24T05:14:50.343191700Z I0224 05:14:50.343178 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-02-24T05:14:50.343191700Z I0224 05:14:50.343187 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-02-24T05:14:50.343817607Z I0224 05:14:50.343245 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-02-24T05:14:50.343817607Z I0224 05:14:50.343271 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-02-24T05:14:50.343817607Z I0224 05:14:50.343330 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-02-24T05:14:50.343817607Z I0224 05:14:50.343337 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-02-24T05:14:50.343817607Z I0224 05:14:50.343363 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-02-24T05:14:50.343817607Z I0224 05:14:50.343384 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-02-24T05:14:50.343817607Z W0224 05:14:50.343488 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-8l7xv.json0000640000000000000000000001365215147232357031776 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-77cd4d9559-8l7xv","generateName":"openshift-kube-scheduler-operator-77cd4d9559-","namespace":"openshift-kube-scheduler-operator","uid":"e6f05507-d5c1-4102-a220-1db715a496e3","resourceVersion":"5020","creationTimestamp":"2026-02-24T05:13:07Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"77cd4d9559"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.5/23\"],\"mac_address\":\"0a:58:0a:80:00:05\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.5/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.5\"\n ],\n \"mac\": \"0a:58:0a:80:00:05\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-77cd4d9559","uid":"8a1d2e40-ae41-4486-a651-fe84cf3705c7","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:53Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:53Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.5","podIPs":[{"ip":"10.128.0.5"}],"startTime":"2026-02-24T05:14:23Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-02-24T05:14:53Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-24T05:14:44Z","finishedAt":"2026-02-24T05:14:50Z","containerID":"cri-o://acdec98fa977010c1aa977c4f0cce838f4bc4ae8e6cd6029b1446085a34e0532"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","containerID":"cri-o://e2064230fd04624f769c4f745b80aa38ea29b6c2deabd8a0fd7e19128af8486a","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-1-retry-1-master-0/installer_current.log0000640000000000000000000006556615147232357030511 0ustar00000000000000002026-02-24T05:19:03.089292283Z I0224 05:19:03.089015 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000aec320 cert-secrets:0xc000aec0a0 configmaps:0xc000aabb80 namespace:0xc000aab9a0 optional-configmaps:0xc000aabcc0 optional-secrets:0xc000aabc20 pod:0xc000aaba40 pod-manifest-dir:0xc000aabe00 resource-dir:0xc000aabd60 revision:0xc000aab900 secrets:0xc000aabae0 v:0xc000aecd20] [0xc000aecd20 0xc000aab900 0xc000aab9a0 0xc000aaba40 0xc000aabd60 0xc000aabe00 0xc000aabb80 0xc000aabcc0 0xc000aabc20 0xc000aabae0 0xc000aec320 0xc000aec0a0] [] map[cert-configmaps:0xc000aec140 cert-dir:0xc000aec320 cert-secrets:0xc000aec0a0 configmaps:0xc000aabb80 help:0xc0000fe1e0 kubeconfig:0xc000aab860 log-flush-frequency:0xc000aecc80 namespace:0xc000aab9a0 optional-cert-configmaps:0xc000aec280 optional-cert-secrets:0xc000aec1e0 optional-configmaps:0xc000aabcc0 optional-secrets:0xc000aabc20 pod:0xc000aaba40 pod-manifest-dir:0xc000aabe00 pod-manifests-lock-file:0xc000aec000 resource-dir:0xc000aabd60 revision:0xc000aab900 secrets:0xc000aabae0 timeout-duration:0xc000aabea0 v:0xc000aecd20 vmodule:0xc000aecdc0] [0xc000aab860 0xc000aab900 0xc000aab9a0 0xc000aaba40 0xc000aabae0 0xc000aabb80 0xc000aabc20 0xc000aabcc0 0xc000aabd60 0xc000aabe00 0xc000aabea0 0xc000aec000 0xc000aec0a0 0xc000aec140 0xc000aec1e0 0xc000aec280 0xc000aec320 0xc000aecc80 0xc000aecd20 0xc000aecdc0 0xc0000fe1e0] [0xc000aec140 0xc000aec320 0xc000aec0a0 0xc000aabb80 0xc0000fe1e0 0xc000aab860 0xc000aecc80 0xc000aab9a0 0xc000aec280 0xc000aec1e0 0xc000aabcc0 0xc000aabc20 0xc000aaba40 0xc000aabe00 0xc000aec000 0xc000aabd60 0xc000aab900 0xc000aabae0 0xc000aabea0 0xc000aecd20 0xc000aecdc0] map[104:0xc0000fe1e0 118:0xc000aecd20] [] -1 0 0xc000aaf080 true 0x223d5a0 []} 2026-02-24T05:19:03.089292283Z I0224 05:19:03.089272 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0006cb380)({ 2026-02-24T05:19:03.089292283Z KubeConfig: (string) "", 2026-02-24T05:19:03.089292283Z KubeClient: (kubernetes.Interface) , 2026-02-24T05:19:03.089292283Z Revision: (string) (len=1) "1", 2026-02-24T05:19:03.089292283Z NodeName: (string) "", 2026-02-24T05:19:03.089292283Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-02-24T05:19:03.089292283Z Clock: (clock.RealClock) { 2026-02-24T05:19:03.089292283Z }, 2026-02-24T05:19:03.089292283Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-02-24T05:19:03.089292283Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-24T05:19:03.089292283Z (string) (len=31) "localhost-recovery-client-token" 2026-02-24T05:19:03.089292283Z }, 2026-02-24T05:19:03.089292283Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-24T05:19:03.089292283Z (string) (len=12) "serving-cert" 2026-02-24T05:19:03.089292283Z }, 2026-02-24T05:19:03.089292283Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-02-24T05:19:03.089292283Z (string) (len=18) "kube-scheduler-pod", 2026-02-24T05:19:03.089292283Z (string) (len=6) "config", 2026-02-24T05:19:03.089292283Z (string) (len=17) "serviceaccount-ca", 2026-02-24T05:19:03.089292283Z (string) (len=20) "scheduler-kubeconfig", 2026-02-24T05:19:03.089292283Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-02-24T05:19:03.089292283Z }, 2026-02-24T05:19:03.089292283Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-24T05:19:03.089292283Z (string) (len=16) "policy-configmap" 2026-02-24T05:19:03.089292283Z }, 2026-02-24T05:19:03.089292283Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-02-24T05:19:03.089292283Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-02-24T05:19:03.089292283Z }, 2026-02-24T05:19:03.089292283Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-24T05:19:03.089292283Z CertConfigMapNamePrefixes: ([]string) , 2026-02-24T05:19:03.089292283Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-02-24T05:19:03.089292283Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-02-24T05:19:03.089292283Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-24T05:19:03.089292283Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-24T05:19:03.089292283Z Timeout: (time.Duration) 2m0s, 2026-02-24T05:19:03.089292283Z StaticPodManifestsLockFile: (string) "", 2026-02-24T05:19:03.089292283Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-24T05:19:03.089292283Z KubeletVersion: (string) "" 2026-02-24T05:19:03.089292283Z }) 2026-02-24T05:19:03.090801914Z I0224 05:19:03.090228 1 cmd.go:413] Getting controller reference for node master-0 2026-02-24T05:19:03.183902460Z I0224 05:19:03.183796 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-24T05:19:03.183902460Z I0224 05:19:03.183885 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-24T05:19:03.183970421Z I0224 05:19:03.183898 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-24T05:19:03.187213457Z I0224 05:19:03.187138 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-24T05:19:33.189359662Z I0224 05:19:33.189260 1 cmd.go:524] Getting installer pods for node master-0 2026-02-24T05:19:33.198433865Z I0224 05:19:33.197974 1 cmd.go:542] Latest installer revision for node master-0 is: 1 2026-02-24T05:19:33.198433865Z I0224 05:19:33.198013 1 cmd.go:431] Querying kubelet version for node master-0 2026-02-24T05:19:33.206359399Z I0224 05:19:33.203696 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-02-24T05:19:33.206359399Z I0224 05:19:33.203725 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1" ... 2026-02-24T05:19:33.206359399Z I0224 05:19:33.203930 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1" ... 2026-02-24T05:19:33.206359399Z I0224 05:19:33.203944 1 cmd.go:229] Getting secrets ... 2026-02-24T05:19:33.218089100Z I0224 05:19:33.215901 1 copy.go:32] Got secret openshift-kube-scheduler/localhost-recovery-client-token-1 2026-02-24T05:19:33.222728889Z I0224 05:19:33.221717 1 copy.go:32] Got secret openshift-kube-scheduler/serving-cert-1 2026-02-24T05:19:33.222728889Z I0224 05:19:33.221764 1 cmd.go:242] Getting config maps ... 2026-02-24T05:19:33.231624238Z I0224 05:19:33.229859 1 copy.go:60] Got configMap openshift-kube-scheduler/config-1 2026-02-24T05:19:33.251575690Z I0224 05:19:33.250777 1 copy.go:60] Got configMap openshift-kube-scheduler/kube-scheduler-cert-syncer-kubeconfig-1 2026-02-24T05:19:33.265429277Z I0224 05:19:33.262887 1 copy.go:60] Got configMap openshift-kube-scheduler/kube-scheduler-pod-1 2026-02-24T05:19:33.273711730Z I0224 05:19:33.273616 1 copy.go:60] Got configMap openshift-kube-scheduler/scheduler-kubeconfig-1 2026-02-24T05:19:33.280972287Z I0224 05:19:33.280890 1 copy.go:60] Got configMap openshift-kube-scheduler/serviceaccount-ca-1 2026-02-24T05:19:33.286956230Z I0224 05:19:33.286888 1 copy.go:52] Failed to get config map openshift-kube-scheduler/policy-configmap-1: configmaps "policy-configmap-1" not found 2026-02-24T05:19:33.286956230Z I0224 05:19:33.286928 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/secrets/localhost-recovery-client-token" ... 2026-02-24T05:19:33.287242897Z I0224 05:19:33.287093 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/secrets/localhost-recovery-client-token/ca.crt" ... 2026-02-24T05:19:33.287254758Z I0224 05:19:33.287243 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/secrets/localhost-recovery-client-token/namespace" ... 2026-02-24T05:19:33.287365881Z I0224 05:19:33.287345 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/secrets/localhost-recovery-client-token/token" ... 2026-02-24T05:19:33.287512814Z I0224 05:19:33.287433 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/secrets/serving-cert" ... 2026-02-24T05:19:33.287512814Z I0224 05:19:33.287492 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/secrets/serving-cert/tls.crt" ... 2026-02-24T05:19:33.287600907Z I0224 05:19:33.287580 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/secrets/serving-cert/tls.key" ... 2026-02-24T05:19:33.287686789Z I0224 05:19:33.287665 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/config" ... 2026-02-24T05:19:33.287789591Z I0224 05:19:33.287759 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/config/config.yaml" ... 2026-02-24T05:19:33.287864333Z I0224 05:19:33.287840 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/kube-scheduler-cert-syncer-kubeconfig" ... 2026-02-24T05:19:33.287918195Z I0224 05:19:33.287897 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig" ... 2026-02-24T05:19:33.288002137Z I0224 05:19:33.287976 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/kube-scheduler-pod" ... 2026-02-24T05:19:33.288045538Z I0224 05:19:33.288025 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/kube-scheduler-pod/forceRedeploymentReason" ... 2026-02-24T05:19:33.288133890Z I0224 05:19:33.288108 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/kube-scheduler-pod/pod.yaml" ... 2026-02-24T05:19:33.288226242Z I0224 05:19:33.288189 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/kube-scheduler-pod/version" ... 2026-02-24T05:19:33.288320935Z I0224 05:19:33.288268 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/scheduler-kubeconfig" ... 2026-02-24T05:19:33.288358966Z I0224 05:19:33.288339 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/scheduler-kubeconfig/kubeconfig" ... 2026-02-24T05:19:33.288491449Z I0224 05:19:33.288442 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/serviceaccount-ca" ... 2026-02-24T05:19:33.288574042Z I0224 05:19:33.288551 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-02-24T05:19:33.288660794Z I0224 05:19:33.288638 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-certs" ... 2026-02-24T05:19:33.288880930Z I0224 05:19:33.288690 1 cmd.go:229] Getting secrets ... 2026-02-24T05:19:33.392907203Z I0224 05:19:33.392840 1 copy.go:32] Got secret openshift-kube-scheduler/kube-scheduler-client-cert-key 2026-02-24T05:19:33.392951814Z I0224 05:19:33.392898 1 cmd.go:242] Getting config maps ... 2026-02-24T05:19:33.392951814Z I0224 05:19:33.392911 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key" ... 2026-02-24T05:19:33.393142779Z I0224 05:19:33.393119 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key/tls.crt" ... 2026-02-24T05:19:33.393337974Z I0224 05:19:33.393288 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-certs/secrets/kube-scheduler-client-cert-key/tls.key" ... 2026-02-24T05:19:33.393459777Z I0224 05:19:33.393438 1 cmd.go:335] Getting pod configmaps/kube-scheduler-pod-1 -n openshift-kube-scheduler 2026-02-24T05:19:33.616454049Z I0224 05:19:33.615920 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-02-24T05:19:33.616454049Z I0224 05:19:33.615993 1 cmd.go:379] Writing a pod under "kube-scheduler-pod.yaml" key 2026-02-24T05:19:33.616454049Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"openshift-kube-scheduler","namespace":"openshift-kube-scheduler","creationTimestamp":null,"labels":{"app":"openshift-kube-scheduler","revision":"1","scheduler":"true"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-scheduler","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-certs"}}],"initContainers":[{"name":"wait-for-host-port","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","command":["/usr/bin/timeout","30","/bin/bash","-c"],"args":["echo -n \"Waiting for port :10259 to be released.\"\nwhile [ -n \"$(ss -Htan '( sport = 10259 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","command":["hyperkube","kube-scheduler"],"args":["--config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--feature-gates=AWSClusterHostedDNS=false,AWSEFSDriverVolumeMetrics=true,AdditionalRoutingCapabilities=false,AdminNetworkPolicy=true,AlibabaPlatform=true,AutomatedEtcdBackup=false,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BootcNodeManagement=false,BuildCSIVolumes=true,CSIDriverSharedResource=false,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DisableKubeletCloudCredentialProviders=true,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GCPLabelsTags=true,GatewayAPI=false,HardwareSpeed=true,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,IngressControllerLBSubnetsAWS=true,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,KMSv1=true,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,ManagedBootImages=true,ManagedBootImagesAWS=true,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAWS=true,MultiArchInstallAzure=false,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OnClusterBuild=true,OpenShiftPodSecurityAdmission=false,PersistentIPsForVirtualization=true,PinnedImages=false,PlatformOperators=false,PrivateHostedZoneAWS=true,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SetEIPForNLBIngressController=true,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiNetworks=false,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,VolumeAttributesClass=false,VolumeGroupSnapshot=false","-v=2","--tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt","--tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"ports":[{"containerPort":10259}],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"readinessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","command":["cluster-kube-scheduler-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 11443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:11443 -v=2\n"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2026-02-24T05:19:33.621237641Z I0224 05:19:33.620615 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1/kube-scheduler-pod.yaml" ... 2026-02-24T05:19:33.621237641Z I0224 05:19:33.620951 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-scheduler-pod.yaml" ... 2026-02-24T05:19:33.621237641Z I0224 05:19:33.620962 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-scheduler-pod.yaml" ... 2026-02-24T05:19:33.621237641Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"openshift-kube-scheduler","namespace":"openshift-kube-scheduler","creationTimestamp":null,"labels":{"app":"openshift-kube-scheduler","revision":"1","scheduler":"true"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-scheduler","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-scheduler-certs"}}],"initContainers":[{"name":"wait-for-host-port","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","command":["/usr/bin/timeout","30","/bin/bash","-c"],"args":["echo -n \"Waiting for port :10259 to be released.\"\nwhile [ -n \"$(ss -Htan '( sport = 10259 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","command":["hyperkube","kube-scheduler"],"args":["--config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/scheduler-kubeconfig/kubeconfig","--feature-gates=AWSClusterHostedDNS=false,AWSEFSDriverVolumeMetrics=true,AdditionalRoutingCapabilities=false,AdminNetworkPolicy=true,AlibabaPlatform=true,AutomatedEtcdBackup=false,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BootcNodeManagement=false,BuildCSIVolumes=true,CSIDriverSharedResource=false,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DisableKubeletCloudCredentialProviders=true,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GCPLabelsTags=true,GatewayAPI=false,HardwareSpeed=true,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,IngressControllerLBSubnetsAWS=true,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,KMSv1=true,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,ManagedBootImages=true,ManagedBootImagesAWS=true,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAWS=true,MultiArchInstallAzure=false,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OnClusterBuild=true,OpenShiftPodSecurityAdmission=false,PersistentIPsForVirtualization=true,PinnedImages=false,PlatformOperators=false,PrivateHostedZoneAWS=true,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SetEIPForNLBIngressController=true,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiNetworks=false,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,VolumeAttributesClass=false,VolumeGroupSnapshot=false","-v=2","--tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt","--tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"ports":[{"containerPort":10259}],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"readinessProbe":{"httpGet":{"path":"healthz","port":10259,"scheme":"HTTPS"},"initialDelaySeconds":45},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","command":["cluster-kube-scheduler-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-scheduler-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 11443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-scheduler-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-scheduler-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:11443 -v=2\n"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} config/pod/openshift-kube-scheduler/logs/installer-1-master-0/installer_current.log0000640000000000000000000001275415147232357027177 0ustar00000000000000002026-02-24T05:15:11.992498731Z I0224 05:15:11.991479 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000791d60 cert-secrets:0xc000791ae0 configmaps:0xc000791680 namespace:0xc0007914a0 optional-configmaps:0xc0007917c0 optional-secrets:0xc000791720 pod:0xc000791540 pod-manifest-dir:0xc000791900 resource-dir:0xc000791860 revision:0xc000791400 secrets:0xc0007915e0 v:0xc0008fc1e0] [0xc0008fc1e0 0xc000791400 0xc0007914a0 0xc000791540 0xc000791860 0xc000791900 0xc000791680 0xc0007917c0 0xc000791720 0xc0007915e0 0xc000791d60 0xc000791ae0] [] map[cert-configmaps:0xc000791b80 cert-dir:0xc000791d60 cert-secrets:0xc000791ae0 configmaps:0xc000791680 help:0xc0008fc640 kubeconfig:0xc000791360 log-flush-frequency:0xc0008fc140 namespace:0xc0007914a0 optional-cert-configmaps:0xc000791cc0 optional-cert-secrets:0xc000791c20 optional-configmaps:0xc0007917c0 optional-secrets:0xc000791720 pod:0xc000791540 pod-manifest-dir:0xc000791900 pod-manifests-lock-file:0xc000791a40 resource-dir:0xc000791860 revision:0xc000791400 secrets:0xc0007915e0 timeout-duration:0xc0007919a0 v:0xc0008fc1e0 vmodule:0xc0008fc280] [0xc000791360 0xc000791400 0xc0007914a0 0xc000791540 0xc0007915e0 0xc000791680 0xc000791720 0xc0007917c0 0xc000791860 0xc000791900 0xc0007919a0 0xc000791a40 0xc000791ae0 0xc000791b80 0xc000791c20 0xc000791cc0 0xc000791d60 0xc0008fc140 0xc0008fc1e0 0xc0008fc280 0xc0008fc640] [0xc000791b80 0xc000791d60 0xc000791ae0 0xc000791680 0xc0008fc640 0xc000791360 0xc0008fc140 0xc0007914a0 0xc000791cc0 0xc000791c20 0xc0007917c0 0xc000791720 0xc000791540 0xc000791900 0xc000791a40 0xc000791860 0xc000791400 0xc0007915e0 0xc0007919a0 0xc0008fc1e0 0xc0008fc280] map[104:0xc0008fc640 118:0xc0008fc1e0] [] -1 0 0xc0001ee9c0 true 0x223d5a0 []} 2026-02-24T05:15:11.992498731Z I0224 05:15:11.991753 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000982820)({ 2026-02-24T05:15:11.992498731Z KubeConfig: (string) "", 2026-02-24T05:15:11.992498731Z KubeClient: (kubernetes.Interface) , 2026-02-24T05:15:11.992498731Z Revision: (string) (len=1) "1", 2026-02-24T05:15:11.992498731Z NodeName: (string) "", 2026-02-24T05:15:11.992498731Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-02-24T05:15:11.992498731Z Clock: (clock.RealClock) { 2026-02-24T05:15:11.992498731Z }, 2026-02-24T05:15:11.992498731Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-02-24T05:15:11.992498731Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-24T05:15:11.992498731Z (string) (len=31) "localhost-recovery-client-token" 2026-02-24T05:15:11.992498731Z }, 2026-02-24T05:15:11.992498731Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-24T05:15:11.992498731Z (string) (len=12) "serving-cert" 2026-02-24T05:15:11.992498731Z }, 2026-02-24T05:15:11.992498731Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-02-24T05:15:11.992498731Z (string) (len=18) "kube-scheduler-pod", 2026-02-24T05:15:11.992498731Z (string) (len=6) "config", 2026-02-24T05:15:11.992498731Z (string) (len=17) "serviceaccount-ca", 2026-02-24T05:15:11.992498731Z (string) (len=20) "scheduler-kubeconfig", 2026-02-24T05:15:11.992498731Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-02-24T05:15:11.992498731Z }, 2026-02-24T05:15:11.992498731Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-24T05:15:11.992498731Z (string) (len=16) "policy-configmap" 2026-02-24T05:15:11.992498731Z }, 2026-02-24T05:15:11.992498731Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-02-24T05:15:11.992498731Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-02-24T05:15:11.992498731Z }, 2026-02-24T05:15:11.992498731Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-24T05:15:11.992498731Z CertConfigMapNamePrefixes: ([]string) , 2026-02-24T05:15:11.992498731Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-02-24T05:15:11.992498731Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-02-24T05:15:11.992498731Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-24T05:15:11.992498731Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-24T05:15:11.992498731Z Timeout: (time.Duration) 2m0s, 2026-02-24T05:15:11.992498731Z StaticPodManifestsLockFile: (string) "", 2026-02-24T05:15:11.992498731Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-24T05:15:11.992498731Z KubeletVersion: (string) "" 2026-02-24T05:15:11.992498731Z }) 2026-02-24T05:15:11.994042203Z I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0 2026-02-24T05:15:12.090816525Z I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-24T05:15:12.090816525Z I0224 05:15:12.083331 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-24T05:15:12.090816525Z I0224 05:15:12.083349 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-24T05:15:12.102331465Z I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-24T05:15:42.096142090Z I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0 2026-02-24T05:15:56.100798055Z F0224 05:15:56.100613 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-scheduler/installer-1-master-0.json0000640000000000000000000001643015147232357022657 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-scheduler","uid":"74d070e9-4193-4598-ad68-15955b07d649","resourceVersion":"8362","creationTimestamp":"2026-02-24T05:15:08Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.36/23\"],\"mac_address\":\"0a:58:0a:80:00:24\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.36/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.36\"\n ],\n \"mac\": \"0a:58:0a:80:00:24\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"bee7180e-2d5b-4e17-b173-e1a340e3ccba"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:08Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:56Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:56Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.36","podIPs":[{"ip":"10.128.0.36"}],"startTime":"2026-02-24T05:15:08Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"s: ([]string) (len=1 cap=1) {\n (string) (len=31) \"localhost-recovery-client-token\"\n },\n OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"serving-cert\"\n },\n ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\n (string) (len=18) \"kube-scheduler-pod\",\n (string) (len=6) \"config\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=20) \"scheduler-kubeconfig\",\n (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=16) \"policy-configmap\"\n },\n CertSecretNames: ([]string) (len=1 cap=1) {\n (string) (len=30) \"kube-scheduler-client-cert-key\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\nI0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0224 05:15:12.083331 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0224 05:15:12.083349 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\nF0224 05:15:56.100613 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-24T05:15:11Z","finishedAt":"2026-02-24T05:15:56Z","containerID":"cri-o://ec62ccfb72151c7c722b6450bced3a8fc5369d64de69ed787b605e7b33bf1f14"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","containerID":"cri-o://ec62ccfb72151c7c722b6450bced3a8fc5369d64de69ed787b605e7b33bf1f14","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000005246015147232357030235 0ustar00000000000000002026-02-24T05:16:47.800814802Z weight: 1 2026-02-24T05:16:47.800814802Z - name: ImageLocality 2026-02-24T05:16:47.800814802Z weight: 1 2026-02-24T05:16:47.800814802Z - name: DefaultBinder 2026-02-24T05:16:47.800814802Z weight: 0 2026-02-24T05:16:47.800814802Z permit: {} 2026-02-24T05:16:47.800814802Z postBind: {} 2026-02-24T05:16:47.800814802Z postFilter: {} 2026-02-24T05:16:47.800814802Z preBind: {} 2026-02-24T05:16:47.800814802Z preEnqueue: {} 2026-02-24T05:16:47.800814802Z preFilter: {} 2026-02-24T05:16:47.800814802Z preScore: {} 2026-02-24T05:16:47.800814802Z queueSort: {} 2026-02-24T05:16:47.800814802Z reserve: {} 2026-02-24T05:16:47.800814802Z score: {} 2026-02-24T05:16:47.800814802Z schedulerName: default-scheduler 2026-02-24T05:16:47.800814802Z > 2026-02-24T05:16:47.802716000Z I0224 05:16:47.802650 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-02-24T05:16:47.802716000Z I0224 05:16:47.802677 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-02-24T05:16:47.805462684Z I0224 05:16:47.805366 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-24T05:16:47.805462684Z I0224 05:16:47.805445 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-24T05:16:47.805877927Z I0224 05:16:47.805764 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-02-24T05:16:47.805877927Z I0224 05:16:47.805701 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1771910147\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1771910147\" (2026-02-24 04:15:47 +0000 UTC to 2027-02-24 04:15:47 +0000 UTC (now=2026-02-24 05:16:47.80566481 +0000 UTC))" 2026-02-24T05:16:47.806081573Z I0224 05:16:47.805952 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771910147\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771910147\" (2026-02-24 04:15:47 +0000 UTC to 2029-02-24 04:15:47 +0000 UTC (now=2026-02-24 05:16:47.805937759 +0000 UTC))" 2026-02-24T05:16:47.806081573Z I0224 05:16:47.806064 1 secure_serving.go:213] Serving securely on [::]:10259 2026-02-24T05:16:47.806187616Z I0224 05:16:47.806123 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-24T05:16:47.814184470Z I0224 05:16:47.814021 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.814427208Z I0224 05:16:47.814381 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-02-24T05:16:47.815649754Z I0224 05:16:47.815283 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.815839580Z I0224 05:16:47.815782 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.815901892Z I0224 05:16:47.815858 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-02-24T05:16:47.816192841Z I0224 05:16:47.815574 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.816436079Z I0224 05:16:47.816255 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.816905703Z I0224 05:16:47.816818 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.816905703Z I0224 05:16:47.816877 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.818576644Z I0224 05:16:47.818489 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.818963825Z I0224 05:16:47.818895 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.819566075Z I0224 05:16:47.819502 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.819897165Z I0224 05:16:47.819833 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.820034689Z I0224 05:16:47.819989 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.827577768Z I0224 05:16:47.827524 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.843570987Z I0224 05:16:47.843462 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.849176838Z I0224 05:16:47.849105 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-02-24T05:16:47.906552520Z I0224 05:16:47.906419 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-24T05:16:47.906552520Z I0224 05:16:47.906459 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-02-24T05:16:47.907569981Z I0224 05:16:47.907093 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-24 04:58:17 +0000 UTC to 2036-02-22 04:58:17 +0000 UTC (now=2026-02-24 05:16:47.907049145 +0000 UTC))" 2026-02-24T05:16:47.907569981Z I0224 05:16:47.907167 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-24 05:04:32 +0000 UTC to 2026-02-25 05:04:32 +0000 UTC (now=2026-02-24 05:16:47.907155828 +0000 UTC))" 2026-02-24T05:16:47.907569981Z I0224 05:16:47.907195 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-24 05:04:32 +0000 UTC to 2027-02-24 05:04:32 +0000 UTC (now=2026-02-24 05:16:47.907185859 +0000 UTC))" 2026-02-24T05:16:47.907569981Z I0224 05:16:47.907218 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-24 05:04:33 +0000 UTC to 2027-02-24 05:04:33 +0000 UTC (now=2026-02-24 05:16:47.90720974 +0000 UTC))" 2026-02-24T05:16:47.907569981Z I0224 05:16:47.907243 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-24 05:04:30 +0000 UTC to 2036-02-22 05:04:30 +0000 UTC (now=2026-02-24 05:16:47.90723378 +0000 UTC))" 2026-02-24T05:16:47.907569981Z I0224 05:16:47.907543 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1771910147\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1771910147\" (2026-02-24 04:15:47 +0000 UTC to 2027-02-24 04:15:47 +0000 UTC (now=2026-02-24 05:16:47.907525679 +0000 UTC))" 2026-02-24T05:16:47.907830018Z I0224 05:16:47.907775 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771910147\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771910147\" (2026-02-24 04:15:47 +0000 UTC to 2029-02-24 04:15:47 +0000 UTC (now=2026-02-24 05:16:47.907760016 +0000 UTC))" 2026-02-24T05:16:52.907483231Z E0224 05:16:52.907307 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:17:01.131248760Z E0224 05:17:01.131128 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:17:09.741244081Z E0224 05:17:09.740853 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:17:16.969388539Z E0224 05:17:16.969204 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:17:24.049036755Z E0224 05:17:24.048865 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:17:31.969635335Z E0224 05:17:31.969481 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:17:39.706919178Z E0224 05:17:39.706820 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:17:46.943655072Z E0224 05:17:46.943502 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:17:54.245736683Z E0224 05:17:54.245657 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:18:02.415132895Z E0224 05:18:02.414987 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:18:11.698363164Z E0224 05:18:11.698166 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:18:20.530150551Z E0224 05:18:20.529977 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:18:29.061020257Z E0224 05:18:29.060852 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:18:37.195591833Z E0224 05:18:37.195455 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:19:02.921394808Z I0224 05:19:02.921277 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-02-24T05:19:02.923010932Z I0224 05:19:02.922957 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7b65dc9fcb-zxkt2" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:19:02.923299589Z I0224 05:19:02.923265 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f-hw4m2" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:19:02.926632738Z I0224 05:19:02.925197 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-58fb6744f5-kn2z7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:19:02.927462751Z I0224 05:19:02.927403 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/collect-profiles-29531835-tsgrz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:19:02.933687586Z I0224 05:19:02.933136 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d-jzkmq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.933687586Z I0224 05:19:02.933417 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76-54hnv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.933687586Z I0224 05:19:02.933521 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-5c7cf458b4-65mc5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.935714820Z I0224 05:19:02.934093 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-654dcf5585-fgmnd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.938044921Z I0224 05:19:02.937961 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-86b8dc6d6-mcf2z" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.938431302Z I0224 05:19:02.938385 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-5499d7f7bb-8xdmq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.938633218Z I0224 05:19:02.938592 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-7657d7494-mmsz6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.938877564Z I0224 05:19:02.938843 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-6f47d587d6-7b87v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.948220012Z I0224 05:19:02.948092 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-f94476f49-tlmg5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.948880079Z I0224 05:19:02.948802 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-7f8c75f984-922md" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.948978352Z I0224 05:19:02.948847 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9-pb6sw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.949111015Z I0224 05:19:02.949084 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-65c5c48b9b-hmlsl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.949627770Z I0224 05:19:02.949539 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-596f79dd6f-v22h2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.950453042Z I0224 05:19:02.949982 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-779979bdf7-t98nr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.951221002Z I0224 05:19:02.951129 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-6968c58f46-68rth" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:02.975713684Z I0224 05:19:02.972768 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-59b498fcfb-mprnx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:05.913564241Z I0224 05:19:05.913484 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-gn8m8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:06.107165699Z I0224 05:19:06.107067 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-68vwc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:06.607939886Z I0224 05:19:06.607851 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-df5f88cd4-cwzcs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:07.707158208Z I0224 05:19:07.707058 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-v64s6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:08.404225706Z I0224 05:19:08.403714 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-c56dz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:08.710387377Z I0224 05:19:08.709910 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-xm8sw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:21.852170584Z I0224 05:19:21.852085 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-67dd8d7969-m8d2t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:24.030792806Z I0224 05:19:24.030639 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-54cb48566c-9ww5z" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:25.257720238Z I0224 05:19:25.257473 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f-hw4m2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:25.260222522Z I0224 05:19:25.260171 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-58fb6744f5-kn2z7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:25.260629473Z I0224 05:19:25.260593 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/collect-profiles-29531835-tsgrz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:25.260982152Z I0224 05:19:25.260846 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-7b65dc9fcb-zxkt2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:19:28.495452219Z I0224 05:19:28.495284 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-xxl55" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006770315147232357030435 0ustar00000000000000002026-02-24T05:12:45.251664603Z I0224 05:12:45.251650 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-24 05:04:33 +0000 UTC to 2027-02-24 05:04:33 +0000 UTC (now=2026-02-24 05:12:45.251643933 +0000 UTC))" 2026-02-24T05:12:45.251697284Z I0224 05:12:45.251684 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-24 05:04:30 +0000 UTC to 2036-02-22 05:04:30 +0000 UTC (now=2026-02-24 05:12:45.251677914 +0000 UTC))" 2026-02-24T05:12:45.251731025Z I0224 05:12:45.251718 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-24 05:04:31 +0000 UTC to 2026-02-25 05:04:31 +0000 UTC (now=2026-02-24 05:12:45.251711945 +0000 UTC))" 2026-02-24T05:12:45.251879319Z I0224 05:12:45.251860 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1771909963\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1771909963\" (2026-02-24 04:12:42 +0000 UTC to 2027-02-24 04:12:42 +0000 UTC (now=2026-02-24 05:12:45.251852718 +0000 UTC))" 2026-02-24T05:12:45.252020712Z I0224 05:12:45.252003 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771909963\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771909963\" (2026-02-24 04:12:43 +0000 UTC to 2029-02-24 04:12:43 +0000 UTC (now=2026-02-24 05:12:45.251992582 +0000 UTC))" 2026-02-24T05:12:45.260424305Z I0224 05:12:45.260375 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-02-24T05:12:45.260980959Z I0224 05:12:45.260958 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-r6zx7" 2026-02-24T05:12:46.261888438Z I0224 05:12:46.261601 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-r6zx7" 2026-02-24T05:12:48.263278055Z I0224 05:12:48.263149 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-r6zx7" 2026-02-24T05:12:52.267251789Z I0224 05:12:52.267088 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-r6zx7" 2026-02-24T05:13:00.272060027Z I0224 05:13:00.271941 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-r6zx7" 2026-02-24T05:13:07.856297314Z I0224 05:13:07.856174 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-02-24T05:13:07.912848352Z I0224 05:13:07.912758 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-8l7xv" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:08.012372199Z I0224 05:13:08.012268 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-c48c8bf7c-mcdrl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:08.115124584Z I0224 05:13:08.114997 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-6bb6d78bf-mzb7q" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:08.222300730Z I0224 05:13:08.222175 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-7d7db75979-4fk6k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:13:08.319210213Z I0224 05:13:08.319030 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-9d82f" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:08.414375570Z I0224 05:13:08.413920 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-6fb4df594f-8tv99" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:08.521624749Z I0224 05:13:08.520459 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-49fsv" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:08.616239021Z I0224 05:13:08.616007 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-5bd7768f54-qh6j7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:08.712244200Z I0224 05:13:08.712085 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-8c7d49845-4dhth" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:08.816027613Z I0224 05:13:08.815881 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-5bd7c86784-kbb8z" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:08.917732649Z I0224 05:13:08.917608 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-bcf775fc9-h99t4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:09.023050224Z I0224 05:13:09.022857 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-5cfd9759cf-r4rf2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:13:09.112779762Z I0224 05:13:09.112656 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-545bf96f4d-tfmbs" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:09.211393313Z I0224 05:13:09.211252 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-ncrqj" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:09.315546566Z I0224 05:13:09.315347 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-8zrj9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:09.414469135Z I0224 05:13:09.414365 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-fc889cfd5-r6p58" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:09.517012635Z I0224 05:13:09.516871 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5-zz9fm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:09.616256833Z I0224 05:13:09.616127 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-6569778c84-rr8r7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:09.719230684Z I0224 05:13:09.719111 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-6f5488b997-dbsnm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:10.288147158Z I0224 05:13:10.287960 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-r6zx7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:13:18.807841900Z I0224 05:13:18.807298 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-cg7zd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:13:28.725383608Z I0224 05:13:28.725264 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-8qp5g" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:13:28.920788211Z I0224 05:13:28.920645 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-jknmn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:13:29.707377336Z I0224 05:13:29.707188 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-2vsjh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:13:31.746341907Z I0224 05:13:31.746226 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-5f98f4f8d5-b985k" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:41.103803586Z I0224 05:13:41.103690 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-5d8dfcdc87-b8ght" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:13:41.357609099Z I0224 05:13:41.355792 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-jtdzc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:13:43.299051239Z I0224 05:13:43.298970 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-58fb6744f5-kn2z7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:13:44.296580411Z I0224 05:13:44.296463 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-vp2jg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:13:47.165145191Z I0224 05:13:47.164983 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-rlg4x" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:10.986828037Z I0224 05:14:10.986628 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-vd82q" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.189214479Z I0224 05:14:23.187174 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-8l7xv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.189214479Z I0224 05:14:23.187931 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-c48c8bf7c-mcdrl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.192540119Z I0224 05:14:23.191834 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-9d82f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.196386572Z I0224 05:14:23.196163 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-fc889cfd5-r6p58" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.196421533Z I0224 05:14:23.196370 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-6bb6d78bf-mzb7q" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.197152902Z I0224 05:14:23.196759 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-545bf96f4d-tfmbs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.205597860Z I0224 05:14:23.205479 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-5f98f4f8d5-b985k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.209237559Z I0224 05:14:23.206082 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-8c7d49845-4dhth" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.209237559Z I0224 05:14:23.206374 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-8zrj9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.209237559Z I0224 05:14:23.206607 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-5bd7768f54-qh6j7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.209237559Z I0224 05:14:23.207050 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-ncrqj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.209237559Z I0224 05:14:23.207595 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-5bd7c86784-kbb8z" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.209237559Z I0224 05:14:23.207839 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-6569778c84-rr8r7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.209237559Z I0224 05:14:23.208074 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-6f5488b997-dbsnm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.209237559Z I0224 05:14:23.208437 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-bcf775fc9-h99t4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.209237559Z I0224 05:14:23.208676 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-6fb4df594f-8tv99" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.209885136Z I0224 05:14:23.209803 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-49fsv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.217362168Z I0224 05:14:23.214734 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5-zz9fm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:23.230264305Z I0224 05:14:23.228721 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-r2vvc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:38.633563965Z I0224 05:14:38.631832 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-576b4d78bd-fsmrl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:44.580583165Z I0224 05:14:44.580442 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-5c85bff57-txt9d" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:53.302353412Z I0224 05:14:53.301198 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-2w6mj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:53.831696491Z I0224 05:14:53.830373 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-cdk2w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:54.260542845Z I0224 05:14:54.257464 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-ng8tz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:54.392229267Z I0224 05:14:54.391682 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-t75jj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:54.483649179Z I0224 05:14:54.483555 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7b65dc9fcb-zxkt2" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:14:54.490227002Z I0224 05:14:54.490152 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-6847bb4785-vqn96" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:54.527907179Z I0224 05:14:54.527171 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-84b8d9d697-zvzxs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:54.923321575Z I0224 05:14:54.920392 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-666d7db58c-6d9wp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:55.658202048Z I0224 05:14:55.658093 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-7bcb58f8c7-49bnf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:57.205801840Z I0224 05:14:57.205708 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-669d5ddb7c-jzjkh" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-24T05:14:57.233453819Z I0224 05:14:57.229812 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-65c596ccd9-k8nq7" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-24T05:14:58.048239786Z I0224 05:14:58.048116 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-786f58c449-64k2s" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:58.642605092Z I0224 05:14:58.642517 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-65c596ccd9-k8nq7" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-24T05:14:58.653496065Z I0224 05:14:58.652618 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-669d5ddb7c-jzjkh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:14:59.229733648Z I0224 05:14:59.226948 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5b94645546-lgnpc" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-24T05:14:59.250999309Z I0224 05:14:59.248216 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-56fdc6b8c6-52tgv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:15:00.146219442Z I0224 05:15:00.146118 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/collect-profiles-29531835-tsgrz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:15:06.114448653Z I0224 05:15:06.113995 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-fdc9d7cdd-8v72m" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-24T05:15:06.831155092Z I0224 05:15:06.831056 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5b94645546-lgnpc" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-24T05:15:07.865744681Z I0224 05:15:07.865641 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-fdc9d7cdd-8v72m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:15:09.000430202Z I0224 05:15:08.999784 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5b94645546-lgnpc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:15:10.849924870Z I0224 05:15:10.846377 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-57476485-7g2gq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:15:11.215254398Z I0224 05:15:11.215046 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f-hw4m2" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-24T05:15:12.944408659Z I0224 05:15:12.943660 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-6f8b7f45f7-5df4m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:15:14.037255148Z I0224 05:15:14.031751 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-557cb6655b-75nhl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-24T05:15:14.067819457Z I0224 05:15:14.067645 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-85ff64b64d-965rz" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-24T05:15:17.928960901Z I0224 05:15:17.928892 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-557cb6655b-75nhl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-24T05:15:17.939333429Z I0224 05:15:17.937593 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-85ff64b64d-965rz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:15:20.882609190Z I0224 05:15:20.882505 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-557cb6655b-75nhl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:15:23.730372825Z I0224 05:15:23.729584 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-686847ff5f-zzvtt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:15:27.722747346Z I0224 05:15:27.721925 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-798b897698-6hgvq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-24T05:15:35.998049959Z E0224 05:15:35.997891 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-02-24T05:15:40.997263796Z E0224 05:15:40.997110 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-02-24T05:15:40.997263796Z I0224 05:15:40.997175 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-02-24T05:15:45.998922451Z E0224 05:15:45.998803 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-24T05:15:45.998978832Z E0224 05:15:45.998915 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515147232357023015 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"cea19e65-8294-4a11-9458-560b9b3fbebf","resourceVersion":"8363","creationTimestamp":"2026-02-24T05:14:07Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"56c3cb71c9851003c8de7e7c5db4b87e","kubernetes.io/config.mirror":"56c3cb71c9851003c8de7e7c5db4b87e","kubernetes.io/config.seen":"2026-02-24T05:12:33.963943033Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"22108df1-f7be-4c01-83d3-1c6b04e1f28e","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:29Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:47Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:47Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:29Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-24T05:14:29Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-02-24T05:15:46Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-02-24T05:12:42Z","finishedAt":"2026-02-24T05:15:46Z","containerID":"cri-o://ec92c2ccaab799d81de24af8faba27c40dd8197fcd80279d1de6e4daee2ed87c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","containerID":"cri-o://28b8da242544132c6f029ed620036b6ee2e59516b410b237f207e8e4173db9a8","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000011502215147232357034222 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-24T05:12:53.802301044Z I0224 05:12:53.802242 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-02-24T05:12:54.267565980Z W0224 05:12:54.267438 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-24T05:12:54.267565980Z E0224 05:12:54.267511 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-24T05:13:02.274378564Z W0224 05:13:02.274245 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-24T05:13:02.274378564Z E0224 05:13:02.274351 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-24T05:13:17.135502722Z W0224 05:13:17.135380 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-24T05:13:17.135502722Z E0224 05:13:17.135446 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-24T05:13:25.974972430Z I0224 05:13:25.974837 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-multus namespace 2026-02-24T05:13:26.874778797Z I0224 05:13:26.874640 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-02-24T05:13:27.074466507Z I0224 05:13:27.074349 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-02-24T05:13:32.686749547Z I0224 05:13:32.686565 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ovn-kubernetes namespace 2026-02-24T05:13:40.681842478Z I0224 05:13:40.681729 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-host-network namespace 2026-02-24T05:13:41.884464720Z I0224 05:13:41.884289 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-diagnostics namespace 2026-02-24T05:13:45.743080011Z W0224 05:13:45.742996 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-24T05:13:45.743118442Z E0224 05:13:45.743102 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-24T05:13:45.787497577Z I0224 05:13:45.787411 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-node-identity namespace 2026-02-24T05:13:45.963880872Z E0224 05:13:45.963787 1 leaderelection.go:429] Failed to update lock optimitically: Operation cannot be fulfilled on leases.coordination.k8s.io "cluster-policy-controller-lock": StorageError: invalid object, Code: 4, Key: /kubernetes.io/leases/kube-system/cluster-policy-controller-lock, ResourceVersion: 0, AdditionalErrorMsg: Precondition failed: UID in precondition: 71c8a8bf-e81e-4148-920e-076a870e4eb6, UID in object meta: , falling back to slow path 2026-02-24T05:13:46.683949221Z I0224 05:13:46.683881 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "network-node-identity" not found 2026-02-24T05:13:47.005748745Z I0224 05:13:47.005662 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "network-node-identity-leases" not found 2026-02-24T05:13:53.831490480Z I0224 05:13:53.831385 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1, Resource=network-attachment-definitions k8s.cni.cncf.io/v1alpha1, Resource=ipamclaims k8s.ovn.org/v1, Resource=egressfirewalls k8s.ovn.org/v1, Resource=egressqoses k8s.ovn.org/v1, Resource=egressservices k8s.ovn.org/v1, Resource=userdefinednetworks whereabouts.cni.cncf.io/v1alpha1, Resource=ippools whereabouts.cni.cncf.io/v1alpha1, Resource=nodeslicepools whereabouts.cni.cncf.io/v1alpha1, Resource=overlappingrangeipreservations], removed: [] 2026-02-24T05:13:53.831619503Z I0224 05:13:53.831587 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="overlappingrangeipreservations.whereabouts.cni.cncf.io" 2026-02-24T05:13:53.832362373Z I0224 05:13:53.832328 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="nodeslicepools.whereabouts.cni.cncf.io" 2026-02-24T05:13:53.832377603Z I0224 05:13:53.832361 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressfirewalls.k8s.ovn.org" 2026-02-24T05:13:53.832396214Z I0224 05:13:53.832387 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="network-attachment-definitions.k8s.cni.cncf.io" 2026-02-24T05:13:53.832438325Z I0224 05:13:53.832417 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="userdefinednetworks.k8s.ovn.org" 2026-02-24T05:13:53.832479316Z I0224 05:13:53.832459 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressqoses.k8s.ovn.org" 2026-02-24T05:13:53.832489226Z I0224 05:13:53.832484 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ipamclaims.k8s.cni.cncf.io" 2026-02-24T05:13:53.832505127Z I0224 05:13:53.832498 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressservices.k8s.ovn.org" 2026-02-24T05:13:53.832550198Z I0224 05:13:53.832519 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ippools.whereabouts.cni.cncf.io" 2026-02-24T05:13:53.834986414Z I0224 05:13:53.834908 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:13:53.835261731Z I0224 05:13:53.835244 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:13:53.835461776Z I0224 05:13:53.835427 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:13:53.835610460Z I0224 05:13:53.835570 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:13:53.835731823Z I0224 05:13:53.835705 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:13:53.835888148Z I0224 05:13:53.835831 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:13:53.836007761Z I0224 05:13:53.835974 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:13:53.836132664Z I0224 05:13:53.836109 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:13:53.836432123Z I0224 05:13:53.836397 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:13:53.934112735Z I0224 05:13:53.934011 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-02-24T05:14:16.805391985Z W0224 05:14:16.804642 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-24T05:14:16.805391985Z E0224 05:14:16.805306 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-24T05:14:36.994972817Z I0224 05:14:36.994878 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-service-ca namespace 2026-02-24T05:14:43.304944020Z I0224 05:14:43.304865 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:14:43.534725113Z I0224 05:14:43.534641 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-kube-storage-version-migrator namespace 2026-02-24T05:14:44.381220310Z I0224 05:14:44.381144 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-operator-controller namespace 2026-02-24T05:14:44.401844847Z I0224 05:14:44.401082 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-catalogd namespace 2026-02-24T05:14:51.785982388Z I0224 05:14:51.785870 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-apiserver namespace 2026-02-24T05:14:52.903488511Z I0224 05:14:52.903380 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-oauth-apiserver namespace 2026-02-24T05:14:53.633945112Z I0224 05:14:53.633860 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-dns namespace 2026-02-24T05:14:54.261535212Z I0224 05:14:54.261288 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-controller-manager namespace 2026-02-24T05:14:54.296943127Z I0224 05:14:54.296865 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ingress namespace 2026-02-24T05:14:54.511617707Z I0224 05:14:54.503864 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-route-controller-manager namespace 2026-02-24T05:14:56.911531978Z I0224 05:14:56.911446 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-authentication namespace 2026-02-24T05:15:04.859746466Z I0224 05:15:04.856497 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:useroauthaccesstoken-manager" not found 2026-02-24T05:15:04.859746466Z I0224 05:15:04.857335 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-02-24T05:15:08.285359058Z I0224 05:15:08.285283 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-02-24T05:15:10.827031004Z I0224 05:15:10.824792 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-mks7l" has been approved 2026-02-24T05:15:10.861741798Z I0224 05:15:10.861359 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-f6jkl" has been approved 2026-02-24T05:15:12.390043535Z W0224 05:15:12.389951 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-24T05:15:12.390043535Z E0224 05:15:12.390016 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-24T05:15:22.666234935Z I0224 05:15:22.666145 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift namespace 2026-02-24T05:15:22.699055638Z I0224 05:15:22.697877 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-node namespace 2026-02-24T05:15:23.964229597Z I0224 05:15:23.964146 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [snapshot.storage.k8s.io/v1, Resource=volumesnapshots], removed: [] 2026-02-24T05:15:23.964375621Z I0224 05:15:23.964342 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="volumesnapshots.snapshot.storage.k8s.io" 2026-02-24T05:15:23.966755037Z I0224 05:15:23.966701 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-24T05:15:24.065454391Z I0224 05:15:24.065383 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-02-24T05:15:28.545689909Z I0224 05:15:28.545603 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "openshift-marketplace-metrics" not found 2026-02-24T05:15:54.077835783Z I0224 05:15:54.077645 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-24T05:15:54.077835783Z E0224 05:15:54.077821 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-24T05:16:01.656708856Z W0224 05:16:01.656578 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-24T05:16:01.656708856Z E0224 05:16:01.656669 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-24T05:16:20.741411478Z E0224 05:16:20.740880 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-24T05:16:24.093711502Z I0224 05:16:24.093552 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-24T05:16:24.093799955Z E0224 05:16:24.093715 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-24T05:16:36.913225974Z W0224 05:16:36.913098 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-24T05:16:36.913225974Z E0224 05:16:36.913173 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-24T05:16:54.107467695Z I0224 05:16:54.107276 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-24T05:16:54.107556508Z E0224 05:16:54.107465 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-24T05:17:20.742753380Z E0224 05:17:20.742641 1 leaderelection.go:436] error retrieving resource lock kube-system/cluster-policy-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-policy-controller-lock) 2026-02-24T05:17:24.127914033Z I0224 05:17:24.127747 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-24T05:17:24.127914033Z E0224 05:17:24.127897 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-24T05:17:31.327465899Z W0224 05:17:31.327377 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-24T05:17:31.327465899Z E0224 05:17:31.327446 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-24T05:17:54.140957577Z I0224 05:17:54.140752 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-24T05:17:54.140957577Z E0224 05:17:54.140905 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-24T05:18:02.457870548Z W0224 05:18:02.457773 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-24T05:18:02.457870548Z E0224 05:18:02.457848 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-24T05:18:24.154170857Z I0224 05:18:24.153968 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-24T05:18:24.154170857Z E0224 05:18:24.154120 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-24T05:18:53.284771429Z I0224 05:18:53.284648 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-02-24T05:18:53.837180179Z I0224 05:18:53.837065 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-cluster-autoscaler-operator" not found 2026-02-24T05:18:54.162671414Z I0224 05:18:54.162553 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-24T05:18:54.162671414Z E0224 05:18:54.162638 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-24T05:18:54.715158147Z I0224 05:18:54.715050 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-controller-manager" not found 2026-02-24T05:18:56.138726184Z I0224 05:18:56.138594 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s" not found 2026-02-24T05:18:57.516362621Z I0224 05:18:57.513054 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found 2026-02-24T05:18:58.889953449Z W0224 05:18:58.889860 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-24T05:18:58.889953449Z E0224 05:18:58.889930 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-24T05:19:24.171530562Z I0224 05:19:24.171392 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-24T05:19:24.171530562Z E0224 05:19:24.171485 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" kube-controller-manager_current.log0000640000000000000000000006307615147232357033615 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-24T05:19:05.798898682Z I0224 05:19:05.798543 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/olm-operator-5499d7f7bb" duration="68.212µs" 2026-02-24T05:19:05.822919140Z I0224 05:19:05.822851 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/catalog-operator-596f79dd6f" duration="9.361508ms" 2026-02-24T05:19:05.823163266Z I0224 05:19:05.823137 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/catalog-operator-596f79dd6f" duration="79.532µs" 2026-02-24T05:19:05.854534200Z I0224 05:19:05.854023 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-7f8c75f984" duration="10.464417ms" 2026-02-24T05:19:05.857990413Z I0224 05:19:05.857826 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-7f8c75f984" duration="88.342µs" 2026-02-24T05:19:06.500050557Z I0224 05:19:06.499623 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager/controller-manager-7657d7494" duration="66.004235ms" 2026-02-24T05:19:06.500050557Z I0224 05:19:06.499762 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager/controller-manager-7657d7494" duration="88.573µs" 2026-02-24T05:19:06.590610685Z I0224 05:19:06.590527 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-operator-lifecycle-manager/packageserver-df5f88cd4" need=1 creating=1 2026-02-24T05:19:06.608797439Z I0224 05:19:06.608707 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/packageserver" err="Operation cannot be fulfilled on deployments.apps \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-24T05:19:06.613014031Z I0224 05:19:06.612767 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-df5f88cd4" duration="22.287203ms" 2026-02-24T05:19:06.625230806Z I0224 05:19:06.625136 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-df5f88cd4" duration="12.314248ms" 2026-02-24T05:19:06.625454052Z I0224 05:19:06.625411 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/packageserver" err="Operation cannot be fulfilled on deployments.apps \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-24T05:19:06.640257966Z I0224 05:19:06.640145 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-df5f88cd4" duration="14.943107ms" 2026-02-24T05:19:06.640353318Z I0224 05:19:06.640322 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-df5f88cd4" duration="111.333µs" 2026-02-24T05:19:09.211165728Z I0224 05:19:09.209807 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-65c5c48b9b" duration="97.863µs" 2026-02-24T05:19:09.228711469Z I0224 05:19:09.228610 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-6f47d587d6" duration="88.112µs" 2026-02-24T05:19:09.253979648Z I0224 05:19:09.253132 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-59b498fcfb" duration="74.352µs" 2026-02-24T05:19:09.278846287Z I0224 05:19:09.278718 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76" duration="116.223µs" 2026-02-24T05:19:09.305449820Z I0224 05:19:09.303708 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-f94476f49" duration="61.592µs" 2026-02-24T05:19:09.324432058Z I0224 05:19:09.324364 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-6968c58f46" duration="101.562µs" 2026-02-24T05:19:09.346268570Z I0224 05:19:09.346190 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-5c7cf458b4" duration="70.391µs" 2026-02-24T05:19:09.368768808Z I0224 05:19:09.368604 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-image-registry/cluster-image-registry-operator-779979bdf7" duration="95.523µs" 2026-02-24T05:19:09.391424790Z I0224 05:19:09.390661 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-86b8dc6d6" duration="76.811µs" 2026-02-24T05:19:17.274334903Z I0224 05:19:17.274203 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" need=0 deleting=1 2026-02-24T05:19:17.274334903Z I0224 05:19:17.274257 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" relatedReplicaSets=["openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d"] 2026-02-24T05:19:17.274390284Z I0224 05:19:17.274336 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="cluster-cloud-controller-manager-operator-cbd75ff8d" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d-jzkmq" 2026-02-24T05:19:17.295207909Z I0224 05:19:17.293437 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-24T05:19:17.300439603Z I0224 05:19:17.300363 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="26.197023ms" 2026-02-24T05:19:17.328967166Z I0224 05:19:17.328884 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="28.438481ms" 2026-02-24T05:19:17.350995243Z I0224 05:19:17.350871 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="21.904553ms" 2026-02-24T05:19:17.351173257Z I0224 05:19:17.351116 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="132.873µs" 2026-02-24T05:19:19.678635054Z I0224 05:19:19.678546 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-6f47d587d6" duration="84.512µs" 2026-02-24T05:19:19.678687085Z I0224 05:19:19.678625 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-df5f88cd4" duration="76.912µs" 2026-02-24T05:19:19.727933711Z I0224 05:19:19.727802 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-86b8dc6d6" duration="11.507095ms" 2026-02-24T05:19:19.727969462Z I0224 05:19:19.727946 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-86b8dc6d6" duration="92.492µs" 2026-02-24T05:19:19.787036970Z I0224 05:19:19.786956 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-image-registry/cluster-image-registry-operator-779979bdf7" duration="13.969449ms" 2026-02-24T05:19:19.787083971Z I0224 05:19:19.787073 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-image-registry/cluster-image-registry-operator-779979bdf7" duration="73.852µs" 2026-02-24T05:19:19.814223599Z I0224 05:19:19.813465 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-59b498fcfb" duration="13.433924ms" 2026-02-24T05:19:19.814223599Z I0224 05:19:19.813581 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-59b498fcfb" duration="75.391µs" 2026-02-24T05:19:20.753562320Z I0224 05:19:20.753399 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76" duration="9.71549ms" 2026-02-24T05:19:20.753690893Z I0224 05:19:20.753668 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76" duration="75.472µs" 2026-02-24T05:19:20.772384204Z I0224 05:19:20.772292 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="64.281µs" 2026-02-24T05:19:20.795232711Z I0224 05:19:20.795132 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-df5f88cd4" duration="71.742µs" 2026-02-24T05:19:20.932256273Z I0224 05:19:20.932184 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-f94476f49" duration="10.322305ms" 2026-02-24T05:19:20.932523639Z I0224 05:19:20.932491 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-f94476f49" duration="88.422µs" 2026-02-24T05:19:20.958695082Z I0224 05:19:20.958609 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-6968c58f46" duration="9.788021ms" 2026-02-24T05:19:20.958795494Z I0224 05:19:20.958771 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-6968c58f46" duration="89.202µs" 2026-02-24T05:19:20.989706068Z I0224 05:19:20.989057 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-df5f88cd4" duration="11.297941ms" 2026-02-24T05:19:20.989706068Z I0224 05:19:20.989215 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-df5f88cd4" duration="89.023µs" 2026-02-24T05:19:21.015205274Z I0224 05:19:21.015137 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-5c7cf458b4" duration="10.226803ms" 2026-02-24T05:19:21.015592784Z I0224 05:19:21.015535 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-5c7cf458b4" duration="92.903µs" 2026-02-24T05:19:21.097369956Z I0224 05:19:21.095471 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-65c5c48b9b" duration="13.675241ms" 2026-02-24T05:19:21.097369956Z I0224 05:19:21.095611 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-65c5c48b9b" duration="90.042µs" 2026-02-24T05:19:21.125830497Z I0224 05:19:21.122934 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="55.402µs" 2026-02-24T05:19:21.816554838Z I0224 05:19:21.816442 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="264.976µs" 2026-02-24T05:19:21.824613126Z I0224 05:19:21.824556 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="88.132µs" 2026-02-24T05:19:21.836593964Z I0224 05:19:21.836530 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-67dd8d7969" need=1 creating=1 2026-02-24T05:19:21.857301436Z I0224 05:19:21.857243 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-67dd8d7969" duration="20.756323ms" 2026-02-24T05:19:21.857363098Z I0224 05:19:21.857253 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-24T05:19:21.868127134Z I0224 05:19:21.868080 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-67dd8d7969" duration="10.769647ms" 2026-02-24T05:19:21.868264328Z I0224 05:19:21.868233 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-67dd8d7969" duration="104.343µs" 2026-02-24T05:19:21.901838891Z I0224 05:19:21.901742 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-67dd8d7969" duration="93.342µs" 2026-02-24T05:19:23.849168648Z I0224 05:19:23.848199 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-6f47d587d6" duration="99.283µs" 2026-02-24T05:19:24.006927442Z I0224 05:19:24.006836 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-config-operator/machine-config-controller-54cb48566c" need=1 creating=1 2026-02-24T05:19:24.033668809Z I0224 05:19:24.033586 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-24T05:19:24.033800073Z I0224 05:19:24.033751 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="26.951583ms" 2026-02-24T05:19:24.042000964Z I0224 05:19:24.041928 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="8.114478ms" 2026-02-24T05:19:24.042107846Z I0224 05:19:24.042074 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="99.752µs" 2026-02-24T05:19:24.044695513Z I0224 05:19:24.044640 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="32.061µs" 2026-02-24T05:19:24.056890026Z I0224 05:19:24.056808 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="96.963µs" 2026-02-24T05:19:24.855857479Z I0224 05:19:24.855787 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="73.022µs" 2026-02-24T05:19:24.874336865Z I0224 05:19:24.874248 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-67dd8d7969" duration="7.704738ms" 2026-02-24T05:19:24.874609742Z I0224 05:19:24.874551 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-67dd8d7969" duration="100.003µs" 2026-02-24T05:19:25.260606822Z I0224 05:19:25.257899 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f" duration="101.163µs" 2026-02-24T05:19:25.262714456Z I0224 05:19:25.261230 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29531835" delay="1s" 2026-02-24T05:19:25.262714456Z I0224 05:19:25.261379 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="40.401µs" 2026-02-24T05:19:25.262714456Z I0224 05:19:25.261557 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7b65dc9fcb" duration="44.571µs" 2026-02-24T05:19:25.271913383Z I0224 05:19:25.269537 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f" duration="63.061µs" 2026-02-24T05:19:25.274256093Z I0224 05:19:25.273782 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29531835" delay="1s" 2026-02-24T05:19:25.275786982Z I0224 05:19:25.275553 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="58.002µs" 2026-02-24T05:19:25.295479118Z I0224 05:19:25.295183 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f" duration="77.372µs" 2026-02-24T05:19:25.321069015Z I0224 05:19:25.320803 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29531835" delay="1s" 2026-02-24T05:19:25.362589533Z I0224 05:19:25.362373 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="111.583µs" 2026-02-24T05:19:25.388278743Z I0224 05:19:25.388212 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7b65dc9fcb" duration="72.432µs" 2026-02-24T05:19:25.928436345Z I0224 05:19:25.928068 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="7.336159ms" 2026-02-24T05:19:25.928655281Z I0224 05:19:25.928625 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="60.132µs" 2026-02-24T05:19:26.097282994Z I0224 05:19:26.097201 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29531835" delay="1s" 2026-02-24T05:19:26.216707094Z I0224 05:19:26.216392 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f" duration="141.323µs" 2026-02-24T05:19:26.216707094Z I0224 05:19:26.216520 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="32.071µs" 2026-02-24T05:19:26.894695268Z I0224 05:19:26.894586 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29531835" delay="1s" 2026-02-24T05:19:26.939299245Z I0224 05:19:26.937600 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="10.390696ms" 2026-02-24T05:19:26.939299245Z I0224 05:19:26.937748 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="67.392µs" 2026-02-24T05:19:27.546011978Z I0224 05:19:27.545925 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-6f47d587d6" duration="11.781583ms" 2026-02-24T05:19:27.546011978Z I0224 05:19:27.545987 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-6f47d587d6" duration="30.401µs" 2026-02-24T05:19:27.924600277Z I0224 05:19:27.924525 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29531835" delay="1s" 2026-02-24T05:19:28.913027630Z I0224 05:19:28.912912 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29531835" delay="1s" 2026-02-24T05:19:28.937265423Z I0224 05:19:28.937172 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29531835" delay="1s" 2026-02-24T05:19:29.202944480Z I0224 05:19:29.202833 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f" duration="129.203µs" 2026-02-24T05:19:31.464637696Z E0224 05:19:31.464521 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-02-24T05:19:31.569748088Z I0224 05:19:31.569666 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" kube-controller-manager_previous.log0000640000000000000000000003173215147232357034001 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-24T05:16:35.737660785Z I0224 05:16:35.737629 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-02-24T05:16:35.737660785Z I0224 05:16:35.737638 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-02-24T05:16:35.737660785Z I0224 05:16:35.737645 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-02-24T05:16:35.737677266Z I0224 05:16:35.737655 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-02-24T05:16:35.737677266Z I0224 05:16:35.737665 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-02-24T05:16:35.737692626Z I0224 05:16:35.737674 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-02-24T05:16:35.737692626Z I0224 05:16:35.737681 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-02-24T05:16:35.737707967Z I0224 05:16:35.737691 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-02-24T05:16:35.737707967Z I0224 05:16:35.737698 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-02-24T05:16:35.737723227Z I0224 05:16:35.737705 1 flags.go:64] FLAG: --secure-port="10257" 2026-02-24T05:16:35.737723227Z I0224 05:16:35.737713 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-02-24T05:16:35.737738618Z I0224 05:16:35.737721 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-02-24T05:16:35.737738618Z I0224 05:16:35.737728 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-02-24T05:16:35.737738618Z I0224 05:16:35.737734 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-02-24T05:16:35.737754948Z I0224 05:16:35.737741 1 flags.go:64] FLAG: --tls-cert-file="" 2026-02-24T05:16:35.737769749Z I0224 05:16:35.737749 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-02-24T05:16:35.737769749Z I0224 05:16:35.737758 1 flags.go:64] FLAG: --tls-min-version="" 2026-02-24T05:16:35.737769749Z I0224 05:16:35.737765 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-02-24T05:16:35.737785989Z I0224 05:16:35.737772 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-02-24T05:16:35.737800820Z I0224 05:16:35.737781 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-02-24T05:16:35.737800820Z I0224 05:16:35.737789 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-02-24T05:16:35.737800820Z I0224 05:16:35.737796 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-02-24T05:16:35.737817050Z I0224 05:16:35.737803 1 flags.go:64] FLAG: --v="2" 2026-02-24T05:16:35.737831911Z I0224 05:16:35.737814 1 flags.go:64] FLAG: --version="false" 2026-02-24T05:16:35.737831911Z I0224 05:16:35.737824 1 flags.go:64] FLAG: --vmodule="" 2026-02-24T05:16:35.738371137Z W0224 05:16:35.738288 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-02-24T05:16:35.738371137Z W0224 05:16:35.738306 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-02-24T05:16:35.738371137Z W0224 05:16:35.738358 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-02-24T05:16:35.738401388Z W0224 05:16:35.738367 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-02-24T05:16:35.738401388Z W0224 05:16:35.738374 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-02-24T05:16:35.738401388Z W0224 05:16:35.738382 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-02-24T05:16:35.738401388Z W0224 05:16:35.738390 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-02-24T05:16:35.738401388Z W0224 05:16:35.738396 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-02-24T05:16:35.738429809Z W0224 05:16:35.738403 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-02-24T05:16:35.738429809Z W0224 05:16:35.738409 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-02-24T05:16:35.738429809Z W0224 05:16:35.738415 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-02-24T05:16:35.738429809Z W0224 05:16:35.738421 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-02-24T05:16:35.738447119Z W0224 05:16:35.738428 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-02-24T05:16:35.738447119Z W0224 05:16:35.738435 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-02-24T05:16:35.738447119Z W0224 05:16:35.738442 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-02-24T05:16:35.738463500Z W0224 05:16:35.738448 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-02-24T05:16:35.738463500Z W0224 05:16:35.738455 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-02-24T05:16:35.738478990Z W0224 05:16:35.738461 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-02-24T05:16:35.738478990Z W0224 05:16:35.738467 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-02-24T05:16:35.738478990Z W0224 05:16:35.738474 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-02-24T05:16:35.738495431Z W0224 05:16:35.738480 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-02-24T05:16:35.738495431Z W0224 05:16:35.738485 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-02-24T05:16:35.738495431Z W0224 05:16:35.738491 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-02-24T05:16:35.738511811Z W0224 05:16:35.738497 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-02-24T05:16:35.738511811Z W0224 05:16:35.738504 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-02-24T05:16:35.738527362Z W0224 05:16:35.738509 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-02-24T05:16:35.738527362Z W0224 05:16:35.738515 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-02-24T05:16:35.738527362Z W0224 05:16:35.738523 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-02-24T05:16:35.738543732Z W0224 05:16:35.738528 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-02-24T05:16:35.738543732Z W0224 05:16:35.738534 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-02-24T05:16:35.738543732Z W0224 05:16:35.738540 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-02-24T05:16:35.738559993Z W0224 05:16:35.738550 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-02-24T05:16:35.738581063Z W0224 05:16:35.738558 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-02-24T05:16:35.738581063Z W0224 05:16:35.738565 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-02-24T05:16:35.738581063Z W0224 05:16:35.738571 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-02-24T05:16:35.738597514Z W0224 05:16:35.738578 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-02-24T05:16:35.738597514Z W0224 05:16:35.738584 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-02-24T05:16:35.738597514Z W0224 05:16:35.738590 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-02-24T05:16:35.738613834Z W0224 05:16:35.738598 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-02-24T05:16:35.738613834Z W0224 05:16:35.738606 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-02-24T05:16:35.738629245Z W0224 05:16:35.738612 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-02-24T05:16:35.738629245Z W0224 05:16:35.738618 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-02-24T05:16:35.738629245Z W0224 05:16:35.738624 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-02-24T05:16:35.738645725Z W0224 05:16:35.738629 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-02-24T05:16:35.738645725Z W0224 05:16:35.738635 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-02-24T05:16:35.738645725Z W0224 05:16:35.738640 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-02-24T05:16:35.738662076Z W0224 05:16:35.738647 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-02-24T05:16:35.738662076Z W0224 05:16:35.738653 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-02-24T05:16:35.738677546Z W0224 05:16:35.738659 1 feature_gate.go:330] unrecognized feature gate: Example 2026-02-24T05:16:35.738677546Z W0224 05:16:35.738666 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-02-24T05:16:35.738677546Z W0224 05:16:35.738672 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-02-24T05:16:35.738693827Z W0224 05:16:35.738678 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-02-24T05:16:35.738693827Z W0224 05:16:35.738683 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-02-24T05:16:35.738693827Z W0224 05:16:35.738689 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-02-24T05:16:35.738710007Z W0224 05:16:35.738695 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-02-24T05:16:35.738710007Z W0224 05:16:35.738701 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-02-24T05:16:35.738725448Z W0224 05:16:35.738707 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-02-24T05:16:35.738725448Z W0224 05:16:35.738713 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-02-24T05:16:35.738725448Z W0224 05:16:35.738718 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-02-24T05:16:35.738741718Z W0224 05:16:35.738726 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-02-24T05:16:35.738741718Z W0224 05:16:35.738732 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-02-24T05:16:35.738741718Z W0224 05:16:35.738738 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-02-24T05:16:35.738765349Z W0224 05:16:35.738743 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-02-24T05:16:35.738765349Z W0224 05:16:35.738751 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-02-24T05:16:35.738765349Z W0224 05:16:35.738759 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-02-24T05:16:35.738782139Z W0224 05:16:35.738766 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-02-24T05:16:35.738782139Z W0224 05:16:35.738772 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-02-24T05:16:35.738782139Z W0224 05:16:35.738778 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-02-24T05:16:35.738798560Z W0224 05:16:35.738784 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-02-24T05:16:35.738798560Z W0224 05:16:35.738791 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-02-24T05:16:35.738813960Z W0224 05:16:35.738797 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-02-24T05:16:35.738813960Z W0224 05:16:35.738803 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-02-24T05:16:36.208156455Z I0224 05:16:36.208030 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-02-24T05:16:36.212801237Z I0224 05:16:36.212729 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" 2026-02-24T05:17:36.524798421Z E0224 05:17:36.524653 1 run.go:72] "command failed" err="unable to load configmap based request-header-client-ca-file: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps extension-apiserver-authentication)" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002734715147232357024640 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"208f05b2-30d0-4793-9268-5d8f16844324","resourceVersion":"8426","creationTimestamp":"2026-02-24T05:14:00Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"c9ad9373c007a4fcd25e70622bdc8deb","kubernetes.io/config.mirror":"c9ad9373c007a4fcd25e70622bdc8deb","kubernetes.io/config.seen":"2026-02-24T05:12:33.963941433Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"22108df1-f7be-4c01-83d3-1c6b04e1f28e","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:29Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:37Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:37Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:29Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-24T05:14:29Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-02-24T05:12:45Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","containerID":"cri-o://f4b821030f840d2d8e85c4724668b0193cc5837173c2d037d234e06dfa6a0d7e","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-02-24T05:18:27Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-02-24T05:16:35Z","finishedAt":"2026-02-24T05:17:36Z","containerID":"cri-o://14f05c07a59574af5d65c41c4cab4b8f70b44e6f6cb8561bf8b61c71a4263402"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","containerID":"cri-o://5557a4a59d6ed82812c29ef2ac4e6682ca871ccd9af2af6045fce7cc16101c3a","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415147232357044426 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-7bcfbc574b-8zrj92026-02-24T05:18:54.591998241Z I0224 05:18:54.591756 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-24T05:18:54.591998241Z I0224 05:18:54.591928 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-24T05:18:54.592775942Z I0224 05:18:54.592716 1 observer_polling.go:159] Starting file observer 2026-02-24T05:18:54.609972220Z I0224 05:18:54.609850 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601302238.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb 2026-02-24T05:18:55.070382443Z I0224 05:18:55.070266 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-24T05:18:55.070382443Z W0224 05:18:55.070302 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-24T05:18:55.070382443Z W0224 05:18:55.070330 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-24T05:18:55.070382443Z W0224 05:18:55.070336 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-24T05:18:55.070382443Z W0224 05:18:55.070340 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-24T05:18:55.070382443Z W0224 05:18:55.070345 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-24T05:18:55.070382443Z W0224 05:18:55.070350 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-24T05:18:55.073633760Z I0224 05:18:55.073569 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-24T05:18:55.074026940Z I0224 05:18:55.073944 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-24T05:18:55.074026940Z I0224 05:18:55.073992 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-24T05:18:55.074090442Z I0224 05:18:55.074059 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-02-24T05:18:55.074090442Z I0224 05:18:55.074049 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-24T05:18:55.074181974Z I0224 05:18:55.074132 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-24T05:18:55.074404080Z I0224 05:18:55.074280 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-24T05:18:55.074530463Z I0224 05:18:55.074478 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-24T05:18:55.074555364Z I0224 05:18:55.074541 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-24T05:18:55.076133666Z I0224 05:18:55.074800 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-24T05:18:55.076133666Z I0224 05:18:55.074832 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-24T05:18:55.174908823Z I0224 05:18:55.174792 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-24T05:18:55.174908823Z I0224 05:18:55.174837 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-24T05:18:55.174908823Z I0224 05:18:55.174897 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-controller-manager-operator_previous.log0000640000000000000000000000247215147232357044630 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-7bcfbc574b-8zrj92026-02-24T05:17:09.617846544Z I0224 05:17:09.617125 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-24T05:17:09.617846544Z I0224 05:17:09.617260 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-24T05:17:09.617846544Z I0224 05:17:09.617700 1 observer_polling.go:159] Starting file observer 2026-02-24T05:18:09.625212602Z W0224 05:18:09.625124 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-operator-7bcfbc574b-8zrj9) 2026-02-24T05:18:09.625404247Z I0224 05:18:09.625363 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601302238.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb 2026-02-24T05:18:40.008197049Z F0224 05:18:40.008025 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock": context deadline exceeded kube-controller-manager-operator-7bcfbc574b-8zrj9.json0000640000000000000000000001673315147232357033555 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-7bcfbc574b-8zrj9","generateName":"kube-controller-manager-operator-7bcfbc574b-","namespace":"openshift-kube-controller-manager-operator","uid":"22813c83-2f60-44ad-9624-ad367cec08f7","resourceVersion":"8763","creationTimestamp":"2026-02-24T05:13:09Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"7bcfbc574b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.11/23\"],\"mac_address\":\"0a:58:0a:80:00:0b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.11/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.11\"\n ],\n \"mac\": \"0a:58:0a:80:00:0b\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-7bcfbc574b","uid":"40006618-6b14-4936-a841-4dce607d5c90","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1a3bef9a43438ab475af89a16225f015c17bff1244015493a6a42c049a922ea4"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:55Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:55Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.11","podIPs":[{"ip":"10.128.0.11"}],"startTime":"2026-02-24T05:14:23Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-02-24T05:18:54Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0224 05:17:09.617125 1 cmd.go:253] Using service-serving-cert provided certificates\nI0224 05:17:09.617260 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0224 05:17:09.617700 1 observer_polling.go:159] Starting file observer\nW0224 05:18:09.625124 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-controller-manager-operator-7bcfbc574b-8zrj9)\nI0224 05:18:09.625363 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601302238.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb\nF0224 05:18:40.008025 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-24T05:17:09Z","finishedAt":"2026-02-24T05:18:40Z","containerID":"cri-o://03dd9053750096b7f82252736f4fac427fd0dcd291c847a9672ee97680c7a2e7"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","containerID":"cri-o://c0559153cb9d3232da1d9baca34a653eff61d748f8d7e4af8a7f1e0e1d63e86d","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715147232357027214 0ustar00000000000000002026-02-24T05:15:19.484219386Z I0224 05:15:19.483958 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc00080a140 cert-dir:0xc00080a320 cert-secrets:0xc00080a0a0 configmaps:0xc0004517c0 namespace:0xc000451400 optional-cert-configmaps:0xc00080a280 optional-cert-secrets:0xc00080a1e0 optional-configmaps:0xc000451a40 optional-secrets:0xc000451900 pod:0xc000451540 pod-manifest-dir:0xc000451cc0 resource-dir:0xc000451b80 revision:0xc000450280 secrets:0xc000451680 v:0xc00080b720] [0xc00080b720 0xc000450280 0xc000451400 0xc000451540 0xc000451b80 0xc000451cc0 0xc0004517c0 0xc000451a40 0xc000451680 0xc000451900 0xc00080a320 0xc00080a140 0xc00080a280 0xc00080a0a0 0xc00080a1e0] [] map[cert-configmaps:0xc00080a140 cert-dir:0xc00080a320 cert-secrets:0xc00080a0a0 configmaps:0xc0004517c0 help:0xc00080bae0 kubeconfig:0xc000450000 log-flush-frequency:0xc00080b680 namespace:0xc000451400 optional-cert-configmaps:0xc00080a280 optional-cert-secrets:0xc00080a1e0 optional-configmaps:0xc000451a40 optional-secrets:0xc000451900 pod:0xc000451540 pod-manifest-dir:0xc000451cc0 pod-manifests-lock-file:0xc00080a000 resource-dir:0xc000451b80 revision:0xc000450280 secrets:0xc000451680 timeout-duration:0xc000451e00 v:0xc00080b720 vmodule:0xc00080b7c0] [0xc000450000 0xc000450280 0xc000451400 0xc000451540 0xc000451680 0xc0004517c0 0xc000451900 0xc000451a40 0xc000451b80 0xc000451cc0 0xc000451e00 0xc00080a000 0xc00080a0a0 0xc00080a140 0xc00080a1e0 0xc00080a280 0xc00080a320 0xc00080b680 0xc00080b720 0xc00080b7c0 0xc00080bae0] [0xc00080a140 0xc00080a320 0xc00080a0a0 0xc0004517c0 0xc00080bae0 0xc000450000 0xc00080b680 0xc000451400 0xc00080a280 0xc00080a1e0 0xc000451a40 0xc000451900 0xc000451540 0xc000451cc0 0xc00080a000 0xc000451b80 0xc000450280 0xc000451680 0xc000451e00 0xc00080b720 0xc00080b7c0] map[104:0xc00080bae0 118:0xc00080b720] [] -1 0 0xc000762300 true 0xae1c20 []} 2026-02-24T05:15:19.484396511Z I0224 05:15:19.484253 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0004a8680)({ 2026-02-24T05:15:19.484396511Z KubeConfig: (string) "", 2026-02-24T05:15:19.484396511Z KubeClient: (kubernetes.Interface) , 2026-02-24T05:15:19.484396511Z Revision: (string) (len=1) "1", 2026-02-24T05:15:19.484396511Z NodeName: (string) "", 2026-02-24T05:15:19.484396511Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-02-24T05:15:19.484396511Z Clock: (clock.RealClock) { 2026-02-24T05:15:19.484396511Z }, 2026-02-24T05:15:19.484396511Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-02-24T05:15:19.484396511Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-24T05:15:19.484396511Z (string) (len=11) "etcd-client", 2026-02-24T05:15:19.484396511Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-02-24T05:15:19.484396511Z (string) (len=31) "localhost-recovery-client-token" 2026-02-24T05:15:19.484396511Z }, 2026-02-24T05:15:19.484396511Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-24T05:15:19.484396511Z (string) (len=17) "encryption-config", 2026-02-24T05:15:19.484396511Z (string) (len=21) "webhook-authenticator" 2026-02-24T05:15:19.484396511Z }, 2026-02-24T05:15:19.484396511Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-24T05:15:19.484396511Z (string) (len=18) "kube-apiserver-pod", 2026-02-24T05:15:19.484396511Z (string) (len=6) "config", 2026-02-24T05:15:19.484396511Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-02-24T05:15:19.484396511Z (string) (len=28) "bound-sa-token-signing-certs", 2026-02-24T05:15:19.484396511Z (string) (len=15) "etcd-serving-ca", 2026-02-24T05:15:19.484396511Z (string) (len=18) "kubelet-serving-ca", 2026-02-24T05:15:19.484396511Z (string) (len=22) "sa-token-signing-certs", 2026-02-24T05:15:19.484396511Z (string) (len=29) "kube-apiserver-audit-policies" 2026-02-24T05:15:19.484396511Z }, 2026-02-24T05:15:19.484396511Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-24T05:15:19.484396511Z (string) (len=14) "oauth-metadata", 2026-02-24T05:15:19.484396511Z (string) (len=12) "cloud-config", 2026-02-24T05:15:19.484396511Z (string) (len=24) "kube-apiserver-server-ca" 2026-02-24T05:15:19.484396511Z }, 2026-02-24T05:15:19.484396511Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-02-24T05:15:19.484396511Z (string) (len=17) "aggregator-client", 2026-02-24T05:15:19.484396511Z (string) (len=30) "localhost-serving-cert-certkey", 2026-02-24T05:15:19.484396511Z (string) (len=31) "service-network-serving-certkey", 2026-02-24T05:15:19.484396511Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-02-24T05:15:19.484396511Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-02-24T05:15:19.484396511Z (string) (len=33) "bound-service-account-signing-key", 2026-02-24T05:15:19.484396511Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-02-24T05:15:19.484396511Z (string) (len=31) "check-endpoints-client-cert-key", 2026-02-24T05:15:19.484396511Z (string) (len=14) "kubelet-client", 2026-02-24T05:15:19.484396511Z (string) (len=16) "node-kubeconfigs" 2026-02-24T05:15:19.484396511Z }, 2026-02-24T05:15:19.484396511Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-02-24T05:15:19.484396511Z (string) (len=17) "user-serving-cert", 2026-02-24T05:15:19.484396511Z (string) (len=21) "user-serving-cert-000", 2026-02-24T05:15:19.484396511Z (string) (len=21) "user-serving-cert-001", 2026-02-24T05:15:19.484396511Z (string) (len=21) "user-serving-cert-002", 2026-02-24T05:15:19.484396511Z (string) (len=21) "user-serving-cert-003", 2026-02-24T05:15:19.484396511Z (string) (len=21) "user-serving-cert-004", 2026-02-24T05:15:19.484396511Z (string) (len=21) "user-serving-cert-005", 2026-02-24T05:15:19.484396511Z (string) (len=21) "user-serving-cert-006", 2026-02-24T05:15:19.484396511Z (string) (len=21) "user-serving-cert-007", 2026-02-24T05:15:19.484396511Z (string) (len=21) "user-serving-cert-008", 2026-02-24T05:15:19.484396511Z (string) (len=21) "user-serving-cert-009" 2026-02-24T05:15:19.484396511Z }, 2026-02-24T05:15:19.484396511Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-24T05:15:19.484396511Z (string) (len=20) "aggregator-client-ca", 2026-02-24T05:15:19.484396511Z (string) (len=9) "client-ca", 2026-02-24T05:15:19.484396511Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-24T05:15:19.484396511Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-24T05:15:19.484396511Z }, 2026-02-24T05:15:19.484396511Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-24T05:15:19.484396511Z (string) (len=17) "trusted-ca-bundle" 2026-02-24T05:15:19.484396511Z }, 2026-02-24T05:15:19.484396511Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-24T05:15:19.484396511Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-24T05:15:19.484396511Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-24T05:15:19.484396511Z Timeout: (time.Duration) 2m0s, 2026-02-24T05:15:19.484396511Z StaticPodManifestsLockFile: (string) "", 2026-02-24T05:15:19.484396511Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-24T05:15:19.484396511Z KubeletVersion: (string) "" 2026-02-24T05:15:19.484396511Z }) 2026-02-24T05:15:19.485114471Z I0224 05:15:19.485062 1 cmd.go:413] Getting controller reference for node master-0 2026-02-24T05:15:19.498333209Z I0224 05:15:19.498205 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-24T05:15:19.498333209Z I0224 05:15:19.498272 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-24T05:15:19.498333209Z I0224 05:15:19.498285 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-24T05:15:19.501506797Z I0224 05:15:19.501443 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-24T05:15:49.502200204Z I0224 05:15:49.501962 1 cmd.go:524] Getting installer pods for node master-0 2026-02-24T05:16:03.502786710Z F0224 05:16:03.502607 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115147232357022674 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"e44f770d-f88d-446a-a22f-51b30e89690c","resourceVersion":"8371","creationTimestamp":"2026-02-24T05:15:17Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.40/23\"],\"mac_address\":\"0a:58:0a:80:00:28\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.40/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.40\"\n ],\n \"mac\": \"0a:58:0a:80:00:28\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"3e081e13-8d17-492d-912c-d3463aa53030"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:17:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:17Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:17:09Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:17:09Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:17Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.40","podIPs":[{"ip":"10.128.0.40"}],"startTime":"2026-02-24T05:15:17Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0224 05:15:19.485062 1 cmd.go:413] Getting controller reference for node master-0\nI0224 05:15:19.498205 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0224 05:15:19.498272 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0224 05:15:19.498285 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0224 05:15:19.501443 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0224 05:15:49.501962 1 cmd.go:524] Getting installer pods for node master-0\nF0224 05:16:03.502607 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-24T05:15:18Z","finishedAt":"2026-02-24T05:16:03Z","containerID":"cri-o://1f43a4854636c4d4d499b77fab14041aa2c65280b5d333f68ca719e5325adfaf"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","containerID":"cri-o://1f43a4854636c4d4d499b77fab14041aa2c65280b5d333f68ca719e5325adfaf","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615147232357035774 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-24T05:12:46.957016005Z I0224 05:12:46.956420 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010717615147232357032700 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-24T05:19:24.864273056Z I0224 05:19:24.864203 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:24.898648110Z I0224 05:19:24.898566 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.041741007Z I0224 05:19:25.041678 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.064592054Z I0224 05:19:25.064543 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.098178748Z I0224 05:19:25.098121 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.241352557Z I0224 05:19:25.241279 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.258902808Z I0224 05:19:25.258774 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=8 seatDemandAvg=0.03078559989118916 seatDemandStdev=0.2937830404847403 seatDemandSmoothed=22.9068226396221 fairFrac=2.331974373907979 currentCL=8 concurrencyDenominator=8 backstop=false 2026-02-24T05:19:25.264195754Z I0224 05:19:25.263825 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.298077675Z I0224 05:19:25.298016 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.441795418Z I0224 05:19:25.441730 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.464574834Z I0224 05:19:25.464511 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.498647550Z I0224 05:19:25.498577 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.641330597Z I0224 05:19:25.641215 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.666010381Z I0224 05:19:25.665938 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.699038479Z I0224 05:19:25.698949 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.841722826Z I0224 05:19:25.841657 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.864024490Z I0224 05:19:25.863965 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:25.920402748Z I0224 05:19:25.919460 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.041988304Z I0224 05:19:26.041929 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.064143063Z I0224 05:19:26.064053 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.099355228Z I0224 05:19:26.099205 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.124868563Z E0224 05:19:26.124783 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.61:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.61:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-02-24T05:19:26.241683796Z I0224 05:19:26.241607 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.265260821Z I0224 05:19:26.265193 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.298602478Z I0224 05:19:26.298503 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.443981165Z I0224 05:19:26.443913 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.463946668Z I0224 05:19:26.463861 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.498194549Z I0224 05:19:26.498094 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.641566493Z I0224 05:19:26.641493 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.664424870Z I0224 05:19:26.664369 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.697875660Z I0224 05:19:26.697793 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.841801179Z I0224 05:19:26.841720 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.864286276Z I0224 05:19:26.864237 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:26.898773223Z I0224 05:19:26.898681 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.042383734Z I0224 05:19:27.042278 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.064856842Z I0224 05:19:27.064789 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.098186208Z I0224 05:19:27.098120 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.241839440Z I0224 05:19:27.241765 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.264368839Z I0224 05:19:27.263804 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.301118103Z I0224 05:19:27.301031 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.441571573Z I0224 05:19:27.441485 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.464187864Z I0224 05:19:27.464088 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.498340373Z I0224 05:19:27.498245 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.642437955Z I0224 05:19:27.642364 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.664572714Z I0224 05:19:27.664525 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.702099358Z I0224 05:19:27.702051 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.842089166Z I0224 05:19:27.841999 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.864626335Z I0224 05:19:27.864571 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:27.898394053Z I0224 05:19:27.898349 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.042673062Z I0224 05:19:28.042594 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.063739293Z I0224 05:19:28.063682 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.102372236Z I0224 05:19:28.098421 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.245890494Z I0224 05:19:28.242046 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.265064997Z I0224 05:19:28.265001 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.298754133Z I0224 05:19:28.298653 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.441974033Z I0224 05:19:28.441882 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.464797561Z I0224 05:19:28.464734 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.498619920Z I0224 05:19:28.498287 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.642427635Z I0224 05:19:28.642350 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.666431583Z I0224 05:19:28.666306 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.699371019Z I0224 05:19:28.698934 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.842882598Z I0224 05:19:28.842779 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.864102842Z I0224 05:19:28.864000 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:28.898566808Z I0224 05:19:28.898458 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.042547609Z I0224 05:19:29.042471 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.064364530Z I0224 05:19:29.064242 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.097850700Z I0224 05:19:29.097768 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.242077656Z I0224 05:19:29.241977 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.264939863Z I0224 05:19:29.264854 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.299045680Z I0224 05:19:29.298978 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.442049415Z I0224 05:19:29.441941 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.464522582Z I0224 05:19:29.464406 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.498636120Z I0224 05:19:29.498507 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.642759184Z I0224 05:19:29.642638 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.664703458Z I0224 05:19:29.664569 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.699466631Z I0224 05:19:29.698959 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.842295982Z I0224 05:19:29.842181 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.864352618Z I0224 05:19:29.864247 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:29.898624429Z I0224 05:19:29.898499 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.042337283Z I0224 05:19:30.042186 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.065757995Z I0224 05:19:30.065685 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.098040965Z I0224 05:19:30.097935 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.241858411Z I0224 05:19:30.241742 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.264949094Z I0224 05:19:30.264830 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.299394689Z I0224 05:19:30.298869 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.443546984Z I0224 05:19:30.443097 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.465057167Z I0224 05:19:30.464936 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.498066675Z I0224 05:19:30.497952 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.641532903Z I0224 05:19:30.641446 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.666543095Z I0224 05:19:30.666475 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.699648615Z I0224 05:19:30.699572 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.842271941Z I0224 05:19:30.842193 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.864684267Z I0224 05:19:30.864619 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:30.897705646Z I0224 05:19:30.897641 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:31.042174159Z I0224 05:19:31.042090 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:31.064071631Z I0224 05:19:31.064016 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:31.098459195Z I0224 05:19:31.098399 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:31.242364644Z I0224 05:19:31.242184 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-24T05:19:31.252608187Z E0224 05:19:31.252467 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.61:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.61:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-02-24T05:19:31.298225909Z I0224 05:19:31.298121 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015147232357031154 0ustar00000000000000002026-02-24T05:12:42.814957339Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115147232357037164 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-5d87bf58c-ncrqj2026-02-24T05:18:52.511181465Z I0224 05:18:52.511000 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-24T05:18:52.511181465Z I0224 05:18:52.511148 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-24T05:18:52.511840844Z I0224 05:18:52.511760 1 observer_polling.go:159] Starting file observer 2026-02-24T05:18:52.535674747Z I0224 05:18:52.535613 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601302238.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-24T05:18:52.829471820Z I0224 05:18:52.829357 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-24T05:18:52.829471820Z W0224 05:18:52.829405 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-24T05:18:52.829471820Z W0224 05:18:52.829410 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-24T05:18:52.829471820Z W0224 05:18:52.829414 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-24T05:18:52.829471820Z W0224 05:18:52.829418 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-24T05:18:52.829471820Z W0224 05:18:52.829421 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-24T05:18:52.829471820Z W0224 05:18:52.829423 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-24T05:18:52.832584063Z I0224 05:18:52.832518 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-24T05:18:52.832608673Z I0224 05:18:52.832583 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-24T05:18:52.832718086Z I0224 05:18:52.832645 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-24T05:18:52.832718086Z I0224 05:18:52.832705 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-24T05:18:52.832861070Z I0224 05:18:52.832708 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-24T05:18:52.832872830Z I0224 05:18:52.832853 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-24T05:18:52.832884191Z I0224 05:18:52.832868 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-24T05:18:52.832961663Z I0224 05:18:52.832811 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-24T05:18:52.832961663Z I0224 05:18:52.832896 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-24T05:18:52.833125997Z I0224 05:18:52.832906 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-24T05:18:52.833742984Z I0224 05:18:52.833689 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-02-24T05:18:52.933688721Z I0224 05:18:52.933585 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-24T05:18:52.933688721Z I0224 05:18:52.933679 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-24T05:18:52.933842945Z I0224 05:18:52.933763 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-apiserver-operator_previous.log0000640000000000000000000000242515147232357037363 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-5d87bf58c-ncrqj2026-02-24T05:17:09.630351551Z I0224 05:17:09.630113 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-24T05:17:09.630351551Z I0224 05:17:09.630255 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-24T05:17:09.630729560Z I0224 05:17:09.630666 1 observer_polling.go:159] Starting file observer 2026-02-24T05:18:09.637545759Z W0224 05:18:09.637433 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-apiserver-operator-5d87bf58c-ncrqj) 2026-02-24T05:18:09.637954550Z I0224 05:18:09.637911 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601302238.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-24T05:18:40.047364441Z F0224 05:18:40.047171 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-apiserver-operator/leases/kube-apiserver-operator-lock": context deadline exceeded config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-ncrqj.json0000640000000000000000000001600215147232357030151 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-5d87bf58c-ncrqj","generateName":"kube-apiserver-operator-5d87bf58c-","namespace":"openshift-kube-apiserver-operator","uid":"17f8e10b-88dc-4158-a7c4-aaa2f5d5fb9d","resourceVersion":"8716","creationTimestamp":"2026-02-24T05:13:09Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"5d87bf58c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.21/23\"],\"mac_address\":\"0a:58:0a:80:00:15\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.21/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.21\"\n ],\n \"mac\": \"0a:58:0a:80:00:15\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-5d87bf58c","uid":"275d2b32-20a3-4709-b2c6-6ff536a5b01c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:24Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:53Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:53Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.21","podIPs":[{"ip":"10.128.0.21"}],"startTime":"2026-02-24T05:14:23Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-02-24T05:18:52Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0224 05:17:09.630113 1 cmd.go:253] Using service-serving-cert provided certificates\nI0224 05:17:09.630255 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0224 05:17:09.630666 1 observer_polling.go:159] Starting file observer\nW0224 05:18:09.637433 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods kube-apiserver-operator-5d87bf58c-ncrqj)\nI0224 05:18:09.637911 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601302238.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af\nF0224 05:18:40.047171 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-apiserver-operator/leases/kube-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-24T05:17:09Z","finishedAt":"2026-02-24T05:18:40Z","containerID":"cri-o://3b73827e2bb1f8b20c02df6acec604b6c43e878ca9e2bd5192c12a2a62cbd894"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","containerID":"cri-o://4128e6ec737b6b0efca5e7827427326735a8755e3faf1df48d6f075e6755cd88","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007425215147232357025215 0ustar00000000000000002026-02-24T05:15:29.950355037Z 2026-02-24T05:15:29.950355037Z cluster-etcd-operator rev \ 2026-02-24T05:15:29.950355037Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-02-24T05:15:29.950355037Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-02-24T05:15:29.950355037Z --client-key-file=$(ETCDCTL_KEY) \ 2026-02-24T05:15:29.950355037Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-02-24T05:15:29.950355037Z securityContext: 2026-02-24T05:15:29.950355037Z privileged: true 2026-02-24T05:15:29.950355037Z resources: 2026-02-24T05:15:29.950355037Z requests: 2026-02-24T05:15:29.950355037Z memory: 50Mi 2026-02-24T05:15:29.950355037Z cpu: 10m 2026-02-24T05:15:29.950355037Z env: 2026-02-24T05:15:29.950355037Z - name: "ALL_ETCD_ENDPOINTS" 2026-02-24T05:15:29.950355037Z value: "https://192.168.32.10:2379" 2026-02-24T05:15:29.950355037Z - name: "ETCDCTL_API" 2026-02-24T05:15:29.950355037Z value: "3" 2026-02-24T05:15:29.950355037Z - name: "ETCDCTL_CACERT" 2026-02-24T05:15:29.950355037Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-02-24T05:15:29.950355037Z - name: "ETCDCTL_CERT" 2026-02-24T05:15:29.950355037Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-02-24T05:15:29.950355037Z - name: "ETCDCTL_ENDPOINTS" 2026-02-24T05:15:29.950355037Z value: "https://192.168.32.10:2379" 2026-02-24T05:15:29.950355037Z - name: "ETCDCTL_KEY" 2026-02-24T05:15:29.950355037Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-02-24T05:15:29.950355037Z - name: "ETCD_CIPHER_SUITES" 2026-02-24T05:15:29.950355037Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-02-24T05:15:29.950355037Z - name: "ETCD_DATA_DIR" 2026-02-24T05:15:29.950355037Z value: "/var/lib/etcd" 2026-02-24T05:15:29.950355037Z - name: "ETCD_ELECTION_TIMEOUT" 2026-02-24T05:15:29.950355037Z value: "2500" 2026-02-24T05:15:29.950355037Z - name: "ETCD_ENABLE_PPROF" 2026-02-24T05:15:29.950355037Z value: "true" 2026-02-24T05:15:29.950355037Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-02-24T05:15:29.950355037Z value: "1" 2026-02-24T05:15:29.950355037Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-02-24T05:15:29.950507561Z value: "200ms" 2026-02-24T05:15:29.950507561Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-02-24T05:15:29.950507561Z value: "5s" 2026-02-24T05:15:29.950507561Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-02-24T05:15:29.950507561Z value: "500" 2026-02-24T05:15:29.950507561Z - name: "ETCD_IMAGE" 2026-02-24T05:15:29.950507561Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef" 2026-02-24T05:15:29.950507561Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-02-24T05:15:29.950507561Z value: "existing" 2026-02-24T05:15:29.950507561Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-02-24T05:15:29.950507561Z value: "8589934592" 2026-02-24T05:15:29.950507561Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-02-24T05:15:29.950507561Z value: "true" 2026-02-24T05:15:29.950507561Z - name: "ETCD_TLS_MIN_VERSION" 2026-02-24T05:15:29.950507561Z value: "TLS1.2" 2026-02-24T05:15:29.950507561Z - name: "NODE_master_0_ETCD_NAME" 2026-02-24T05:15:29.950507561Z value: "master-0" 2026-02-24T05:15:29.950507561Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-02-24T05:15:29.950507561Z value: "192.168.32.10" 2026-02-24T05:15:29.950507561Z - name: "NODE_master_0_IP" 2026-02-24T05:15:29.950507561Z value: "192.168.32.10" 2026-02-24T05:15:29.950507561Z volumeMounts: 2026-02-24T05:15:29.950507561Z - mountPath: /var/lib/etcd 2026-02-24T05:15:29.950507561Z name: data-dir 2026-02-24T05:15:29.950507561Z - mountPath: /etc/kubernetes/static-pod-certs 2026-02-24T05:15:29.950507561Z name: cert-dir 2026-02-24T05:15:29.950507561Z hostNetwork: true 2026-02-24T05:15:29.950507561Z priorityClassName: system-node-critical 2026-02-24T05:15:29.950507561Z tolerations: 2026-02-24T05:15:29.950507561Z - operator: "Exists" 2026-02-24T05:15:29.950507561Z volumes: 2026-02-24T05:15:29.950507561Z - hostPath: 2026-02-24T05:15:29.950507561Z path: /etc/kubernetes/manifests 2026-02-24T05:15:29.950507561Z name: static-pod-dir 2026-02-24T05:15:29.950507561Z - hostPath: 2026-02-24T05:15:29.950507561Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-02-24T05:15:29.950507561Z name: resource-dir 2026-02-24T05:15:29.950507561Z - hostPath: 2026-02-24T05:15:29.950507561Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-02-24T05:15:29.950507561Z name: cert-dir 2026-02-24T05:15:29.950507561Z - hostPath: 2026-02-24T05:15:29.950507561Z path: /var/lib/etcd 2026-02-24T05:15:29.950507561Z type: "" 2026-02-24T05:15:29.950507561Z name: data-dir 2026-02-24T05:15:29.950507561Z - hostPath: 2026-02-24T05:15:29.950507561Z path: /usr/local/bin 2026-02-24T05:15:29.950507561Z name: usr-local-bin 2026-02-24T05:15:29.950507561Z - hostPath: 2026-02-24T05:15:29.950507561Z path: /var/log/etcd 2026-02-24T05:15:29.950507561Z name: log-dir 2026-02-24T05:15:29.950507561Z - hostPath: 2026-02-24T05:15:29.950507561Z path: /etc/kubernetes 2026-02-24T05:15:29.950507561Z name: config-dir 2026-02-24T05:15:29.950507561Z - hostPath: 2026-02-24T05:15:29.950507561Z path: /var/lib/etcd-auto-backup 2026-02-24T05:15:29.950507561Z name: etcd-auto-backup-dir 2026-02-24T05:15:29.958101172Z I0224 05:15:29.957190 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-02-24T05:15:29.958101172Z I0224 05:15:29.957503 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-24T05:15:29.958101172Z I0224 05:15:29.957512 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-24T05:15:29.958101172Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2026-02-24T05:15:44.145097413Z W0224 05:15:44.144767 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.189716e00e0a9768.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:2d3d57f1-cd67-4f1d-b267-f652b9bb3448,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-02-24 05:15:29.95764004 +0000 UTC m=+31.072801523,LastTimestamp:2026-02-24 05:15:29.95764004 +0000 UTC m=+31.072801523,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: Post "https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/events?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615147232357023505 0ustar00000000000000002026-02-24T05:18:08.062425032Z I0224 05:18:08.061968 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215147232357024202 0ustar00000000000000002026-02-24T05:17:57.709136918Z I0224 05:17:57.708831 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-02-24T05:18:33.019423384Z I0224 05:18:33.019259 1 etcdcli_pool.go:70] creating a new cached client 2026-02-24T05:18:38.019196615Z I0224 05:18:38.019015 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615147232357024361 0ustar00000000000000002026-02-24T05:17:57.322901290Z {"level":"info","ts":"2026-02-24T05:17:57.322554Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-02-24T05:17:57.324176401Z {"level":"info","ts":"2026-02-24T05:17:57.324087Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-02-24T05:17:57.324642714Z {"level":"info","ts":"2026-02-24T05:17:57.324567Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-02-24T05:17:57.324805868Z {"level":"info","ts":"2026-02-24T05:17:57.324716Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-02-24T05:17:57.324865930Z {"level":"info","ts":"2026-02-24T05:17:57.324823Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc000230000/192.168.32.10:9978\""} 2026-02-24T05:17:57.324929121Z {"level":"info","ts":"2026-02-24T05:17:57.324887Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc000230000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-02-24T05:17:57.324951422Z {"level":"info","ts":"2026-02-24T05:17:57.324921Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-02-24T05:17:57.325616038Z {"level":"info","ts":"2026-02-24T05:17:57.325534Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-02-24T05:17:57.325746952Z {"level":"info","ts":"2026-02-24T05:17:57.325654Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-02-24T05:17:57.325878435Z {"level":"info","ts":"2026-02-24T05:17:57.325817Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc00011ab20 } }"} 2026-02-24T05:17:57.325904736Z {"level":"info","ts":"2026-02-24T05:17:57.325876Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-02-24T05:17:57.325978688Z {"level":"info","ts":"2026-02-24T05:17:57.325937Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-02-24T05:17:57.326032269Z {"level":"info","ts":"2026-02-24T05:17:57.325974Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-02-24T05:17:57.326275755Z {"level":"info","ts":"2026-02-24T05:17:57.326112Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-24T05:17:57.326275755Z {"level":"info","ts":"2026-02-24T05:17:57.326247Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-24T05:17:57.326602763Z {"level":"info","ts":"2026-02-24T05:17:57.326465Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, CONNECTING"} 2026-02-24T05:17:57.327118506Z {"level":"info","ts":"2026-02-24T05:17:57.326958Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:17:57.328128842Z {"level":"warn","ts":"2026-02-24T05:17:57.327627Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:17:57.328168623Z {"level":"info","ts":"2026-02-24T05:17:57.328131Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:17:57.328498821Z {"level":"info","ts":"2026-02-24T05:17:57.328273Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, TRANSIENT_FAILURE"} 2026-02-24T05:17:57.328557723Z {"level":"info","ts":"2026-02-24T05:17:57.328510Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-02-24T05:17:57.330374159Z {"level":"info","ts":"2026-02-24T05:17:57.330143Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-02-24T05:17:57.330561754Z {"level":"info","ts":"2026-02-24T05:17:57.330492Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-02-24T05:17:57.331023906Z {"level":"info","ts":"2026-02-24T05:17:57.330930Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-02-24T05:17:57.331023906Z {"level":"info","ts":"2026-02-24T05:17:57.330994Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-02-24T05:17:57.331043416Z {"level":"info","ts":"2026-02-24T05:17:57.331013Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-02-24T05:17:57.331043416Z {"level":"info","ts":"2026-02-24T05:17:57.331029Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-02-24T05:17:57.331561199Z {"level":"info","ts":"2026-02-24T05:17:57.331489Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-02-24T05:17:58.328671270Z {"level":"info","ts":"2026-02-24T05:17:58.328493Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:17:58.328671270Z {"level":"info","ts":"2026-02-24T05:17:58.328628Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, IDLE"} 2026-02-24T05:17:58.328788313Z {"level":"info","ts":"2026-02-24T05:17:58.328708Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-24T05:17:58.328788313Z {"level":"info","ts":"2026-02-24T05:17:58.328764Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-24T05:17:58.329045729Z {"level":"info","ts":"2026-02-24T05:17:58.328930Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, CONNECTING"} 2026-02-24T05:17:58.329400838Z {"level":"info","ts":"2026-02-24T05:17:58.329265Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:17:58.329429038Z {"level":"warn","ts":"2026-02-24T05:17:58.329386Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:17:58.329479100Z {"level":"info","ts":"2026-02-24T05:17:58.329439Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:17:58.329526991Z {"level":"info","ts":"2026-02-24T05:17:58.329492Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, TRANSIENT_FAILURE"} 2026-02-24T05:17:59.681186427Z {"level":"info","ts":"2026-02-24T05:17:59.681030Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:17:59.681186427Z {"level":"info","ts":"2026-02-24T05:17:59.681140Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, IDLE"} 2026-02-24T05:17:59.681274559Z {"level":"info","ts":"2026-02-24T05:17:59.681195Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-24T05:17:59.681274559Z {"level":"info","ts":"2026-02-24T05:17:59.681251Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-24T05:17:59.681537086Z {"level":"info","ts":"2026-02-24T05:17:59.681425Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, CONNECTING"} 2026-02-24T05:17:59.681953266Z {"level":"info","ts":"2026-02-24T05:17:59.681869Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:17:59.681953266Z {"level":"warn","ts":"2026-02-24T05:17:59.681929Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:17:59.682008458Z {"level":"info","ts":"2026-02-24T05:17:59.681983Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:17:59.682091280Z {"level":"info","ts":"2026-02-24T05:17:59.682041Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, TRANSIENT_FAILURE"} 2026-02-24T05:18:01.742501748Z {"level":"info","ts":"2026-02-24T05:18:01.742296Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:18:01.742501748Z {"level":"info","ts":"2026-02-24T05:18:01.742441Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, IDLE"} 2026-02-24T05:18:01.742585130Z {"level":"info","ts":"2026-02-24T05:18:01.742497Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-24T05:18:01.742585130Z {"level":"info","ts":"2026-02-24T05:18:01.742550Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-24T05:18:01.742833156Z {"level":"info","ts":"2026-02-24T05:18:01.742728Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, CONNECTING"} 2026-02-24T05:18:01.743192645Z {"level":"info","ts":"2026-02-24T05:18:01.743108Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:18:01.743212056Z {"level":"warn","ts":"2026-02-24T05:18:01.743174Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:18:01.743450692Z {"level":"info","ts":"2026-02-24T05:18:01.743278Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:18:01.743477752Z {"level":"info","ts":"2026-02-24T05:18:01.743452Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, TRANSIENT_FAILURE"} 2026-02-24T05:18:05.725797244Z {"level":"info","ts":"2026-02-24T05:18:05.725638Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-24T05:18:05.725797244Z {"level":"info","ts":"2026-02-24T05:18:05.725751Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, IDLE"} 2026-02-24T05:18:05.725890036Z {"level":"info","ts":"2026-02-24T05:18:05.725793Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-24T05:18:05.725890036Z {"level":"info","ts":"2026-02-24T05:18:05.725827Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-24T05:18:05.726115312Z {"level":"info","ts":"2026-02-24T05:18:05.726003Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, CONNECTING"} 2026-02-24T05:18:05.737040693Z {"level":"info","ts":"2026-02-24T05:18:05.736942Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-02-24T05:18:05.737069373Z {"level":"info","ts":"2026-02-24T05:18:05.737047Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc0001afb30, READY"} 2026-02-24T05:18:05.737200607Z {"level":"info","ts":"2026-02-24T05:18:05.737156Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-02-24T05:18:05.737211897Z {"level":"info","ts":"2026-02-24T05:18:05.737197Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013301415147232357022713 0ustar00000000000000002026-02-24T05:19:13.358390142Z {"level":"warn","ts":"2026-02-24T05:19:13.358299Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"430.574966ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-cloud-credential-operator/cloud-credential-operator\" ","response":"range_response_count:1 size:6780"} 2026-02-24T05:19:13.358426083Z {"level":"info","ts":"2026-02-24T05:19:13.358387Z","caller":"traceutil/trace.go:171","msg":"trace[2129335941] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-cloud-credential-operator/cloud-credential-operator; range_end:; response_count:1; response_revision:9502; }","duration":"430.727581ms","start":"2026-02-24T05:19:12.927645Z","end":"2026-02-24T05:19:13.358373Z","steps":["trace[2129335941] 'agreement among raft nodes before linearized reading' (duration: 430.555566ms)"],"step_count":1} 2026-02-24T05:19:13.358490465Z {"level":"warn","ts":"2026-02-24T05:19:13.358425Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:12.927622Z","time spent":"430.793052ms","remote":"[::1]:34044","response type":"/etcdserverpb.KV/Range","request count":0,"request size":90,"response count":1,"response size":6804,"request content":"key:\"/kubernetes.io/deployments/openshift-cloud-credential-operator/cloud-credential-operator\" "} 2026-02-24T05:19:13.358490465Z {"level":"warn","ts":"2026-02-24T05:19:13.358447Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:12.957809Z","time spent":"400.560274ms","remote":"[::1]:55702","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":469,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-02-24T05:19:13.621058123Z {"level":"info","ts":"2026-02-24T05:19:13.620814Z","caller":"traceutil/trace.go:171","msg":"trace[1129187634] linearizableReadLoop","detail":"{readStateIndex:9948; appliedIndex:9947; }","duration":"262.572769ms","start":"2026-02-24T05:19:13.358206Z","end":"2026-02-24T05:19:13.620778Z","steps":["trace[1129187634] 'read index received' (duration: 219.03663ms)","trace[1129187634] 'applied index is now lower than readState.Index' (duration: 43.534419ms)"],"step_count":2} 2026-02-24T05:19:13.621058123Z {"level":"warn","ts":"2026-02-24T05:19:13.620946Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"618.807324ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/services/specs/openshift-machine-api/cluster-autoscaler-operator\" ","response":"range_response_count:1 size:2063"} 2026-02-24T05:19:13.621058123Z {"level":"warn","ts":"2026-02-24T05:19:13.620950Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"560.464484ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-02-24T05:19:13.621058123Z {"level":"warn","ts":"2026-02-24T05:19:13.620975Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"568.767108ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-machine-api/cluster-baremetal-operator\" ","response":"range_response_count:1 size:1494"} 2026-02-24T05:19:13.621180146Z {"level":"warn","ts":"2026-02-24T05:19:13.620979Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"593.464503ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/security.openshift.io/securitycontextconstraints/anyuid\" ","response":"range_response_count:1 size:2284"} 2026-02-24T05:19:13.621180146Z {"level":"info","ts":"2026-02-24T05:19:13.621033Z","caller":"traceutil/trace.go:171","msg":"trace[1350755160] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-machine-api/cluster-autoscaler-operator; range_end:; response_count:1; response_revision:9503; }","duration":"618.902736ms","start":"2026-02-24T05:19:13.002109Z","end":"2026-02-24T05:19:13.621012Z","steps":["trace[1350755160] 'agreement among raft nodes before linearized reading' (duration: 618.759992ms)"],"step_count":1} 2026-02-24T05:19:13.621180146Z {"level":"info","ts":"2026-02-24T05:19:13.621053Z","caller":"traceutil/trace.go:171","msg":"trace[703886093] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:9503; }","duration":"560.641259ms","start":"2026-02-24T05:19:13.060395Z","end":"2026-02-24T05:19:13.621036Z","steps":["trace[703886093] 'agreement among raft nodes before linearized reading' (duration: 560.447094ms)"],"step_count":1} 2026-02-24T05:19:13.621180146Z {"level":"warn","ts":"2026-02-24T05:19:13.621073Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"529.312364ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/certified-operators\" ","response":"range_response_count:1 size:1031"} 2026-02-24T05:19:13.621180146Z {"level":"info","ts":"2026-02-24T05:19:13.621073Z","caller":"traceutil/trace.go:171","msg":"trace[300856250] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-machine-api/cluster-baremetal-operator; range_end:; response_count:1; response_revision:9503; }","duration":"568.924692ms","start":"2026-02-24T05:19:13.052123Z","end":"2026-02-24T05:19:13.621047Z","steps":["trace[300856250] 'agreement among raft nodes before linearized reading' (duration: 568.722947ms)"],"step_count":1} 2026-02-24T05:19:13.621180146Z {"level":"warn","ts":"2026-02-24T05:19:13.621090Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.002102Z","time spent":"618.978139ms","remote":"[::1]:34200","response type":"/etcdserverpb.KV/Range","request count":0,"request size":81,"response count":1,"response size":2087,"request content":"key:\"/kubernetes.io/services/specs/openshift-machine-api/cluster-autoscaler-operator\" "} 2026-02-24T05:19:13.621180146Z {"level":"warn","ts":"2026-02-24T05:19:13.621105Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.060365Z","time spent":"560.727771ms","remote":"[::1]:56062","response type":"/etcdserverpb.KV/Range","request count":0,"request size":48,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 "} 2026-02-24T05:19:13.621180146Z {"level":"warn","ts":"2026-02-24T05:19:13.621112Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"668.408289ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/metal3remediations.infrastructure.cluster.x-k8s.io\" ","response":"range_response_count:1 size:5661"} 2026-02-24T05:19:13.621180146Z {"level":"info","ts":"2026-02-24T05:19:13.621120Z","caller":"traceutil/trace.go:171","msg":"trace[1032641200] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/certified-operators; range_end:; response_count:1; response_revision:9503; }","duration":"529.384505ms","start":"2026-02-24T05:19:13.091718Z","end":"2026-02-24T05:19:13.621103Z","steps":["trace[1032641200] 'agreement among raft nodes before linearized reading' (duration: 529.319984ms)"],"step_count":1} 2026-02-24T05:19:13.621180146Z {"level":"warn","ts":"2026-02-24T05:19:13.621132Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.052089Z","time spent":"569.033455ms","remote":"[::1]:34134","response type":"/etcdserverpb.KV/Range","request count":0,"request size":81,"response count":1,"response size":1518,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-machine-api/cluster-baremetal-operator\" "} 2026-02-24T05:19:13.621180146Z {"level":"warn","ts":"2026-02-24T05:19:13.620944Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"528.796161ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/subscriptions\" limit:1 ","response":"range_response_count:0 size:5"} 2026-02-24T05:19:13.621221807Z {"level":"warn","ts":"2026-02-24T05:19:13.621146Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"518.888416ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-cloud-controller-manager/cloud-controller-manager\" ","response":"range_response_count:1 size:1062"} 2026-02-24T05:19:13.621221807Z {"level":"warn","ts":"2026-02-24T05:19:13.621168Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.091699Z","time spent":"529.461008ms","remote":"[::1]:34134","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":1055,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/certified-operators\" "} 2026-02-24T05:19:13.621221807Z {"level":"info","ts":"2026-02-24T05:19:13.621177Z","caller":"traceutil/trace.go:171","msg":"trace[182420932] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/metal3remediations.infrastructure.cluster.x-k8s.io; range_end:; response_count:1; response_revision:9503; }","duration":"668.528612ms","start":"2026-02-24T05:19:12.952618Z","end":"2026-02-24T05:19:13.621147Z","steps":["trace[182420932] 'agreement among raft nodes before linearized reading' (duration: 668.362618ms)"],"step_count":1} 2026-02-24T05:19:13.621245058Z {"level":"info","ts":"2026-02-24T05:19:13.621204Z","caller":"traceutil/trace.go:171","msg":"trace[1299531424] range","detail":"{range_begin:/kubernetes.io/roles/openshift-cloud-controller-manager/cloud-controller-manager; range_end:; response_count:1; response_revision:9503; }","duration":"518.963857ms","start":"2026-02-24T05:19:13.102224Z","end":"2026-02-24T05:19:13.621188Z","steps":["trace[1299531424] 'agreement among raft nodes before linearized reading' (duration: 518.875195ms)"],"step_count":1} 2026-02-24T05:19:13.621245058Z {"level":"warn","ts":"2026-02-24T05:19:13.621217Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:12.952597Z","time spent":"668.612354ms","remote":"[::1]:34148","response type":"/etcdserverpb.KV/Range","request count":0,"request size":114,"response count":1,"response size":5685,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/metal3remediations.infrastructure.cluster.x-k8s.io\" "} 2026-02-24T05:19:13.621265748Z {"level":"warn","ts":"2026-02-24T05:19:13.621230Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"268.222964ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-config-managed/insights-operator-etc-pki-entitlement\" ","response":"range_response_count:1 size:1200"} 2026-02-24T05:19:13.621294649Z {"level":"info","ts":"2026-02-24T05:19:13.621148Z","caller":"traceutil/trace.go:171","msg":"trace[1412176282] transaction","detail":"{read_only:false; response_revision:9503; number_of_response:1; }","duration":"325.109326ms","start":"2026-02-24T05:19:13.296017Z","end":"2026-02-24T05:19:13.621127Z","steps":["trace[1412176282] 'process raft request' (duration: 281.31719ms)","trace[1412176282] 'compare' (duration: 43.16338ms)"],"step_count":2} 2026-02-24T05:19:13.621294649Z {"level":"warn","ts":"2026-02-24T05:19:13.621249Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.102177Z","time spent":"519.06103ms","remote":"[::1]:34500","response type":"/etcdserverpb.KV/Range","request count":0,"request size":82,"response count":1,"response size":1086,"request content":"key:\"/kubernetes.io/roles/openshift-cloud-controller-manager/cloud-controller-manager\" "} 2026-02-24T05:19:13.621294649Z {"level":"info","ts":"2026-02-24T05:19:13.621268Z","caller":"traceutil/trace.go:171","msg":"trace[883139054] range","detail":"{range_begin:/kubernetes.io/roles/openshift-config-managed/insights-operator-etc-pki-entitlement; range_end:; response_count:1; response_revision:9503; }","duration":"268.309396ms","start":"2026-02-24T05:19:13.352948Z","end":"2026-02-24T05:19:13.621257Z","steps":["trace[883139054] 'agreement among raft nodes before linearized reading' (duration: 268.234114ms)"],"step_count":1} 2026-02-24T05:19:13.621356021Z {"level":"warn","ts":"2026-02-24T05:19:13.621262Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"543.520679ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/cluster-monitoring-operator\" ","response":"range_response_count:1 size:6765"} 2026-02-24T05:19:13.621386991Z {"level":"warn","ts":"2026-02-24T05:19:13.621257Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"644.635068ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-ingress-operator/trusted-ca\" ","response":"range_response_count:1 size:225180"} 2026-02-24T05:19:13.621405752Z {"level":"info","ts":"2026-02-24T05:19:13.621360Z","caller":"traceutil/trace.go:171","msg":"trace[716550851] range","detail":"{range_begin:/kubernetes.io/clusterroles/cluster-monitoring-operator; range_end:; response_count:1; response_revision:9503; }","duration":"543.639052ms","start":"2026-02-24T05:19:13.077705Z","end":"2026-02-24T05:19:13.621344Z","steps":["trace[716550851] 'agreement among raft nodes before linearized reading' (duration: 543.420837ms)"],"step_count":1} 2026-02-24T05:19:13.621506334Z {"level":"info","ts":"2026-02-24T05:19:13.621406Z","caller":"traceutil/trace.go:171","msg":"trace[1703339743] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-ingress-operator/trusted-ca; range_end:; response_count:1; response_revision:9503; }","duration":"644.858643ms","start":"2026-02-24T05:19:12.976521Z","end":"2026-02-24T05:19:13.621380Z","steps":["trace[1703339743] 'agreement among raft nodes before linearized reading' (duration: 644.426222ms)"],"step_count":1} 2026-02-24T05:19:13.621506334Z {"level":"warn","ts":"2026-02-24T05:19:13.621417Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.077694Z","time spent":"543.710824ms","remote":"[::1]:42536","response type":"/etcdserverpb.KV/Range","request count":0,"request size":57,"response count":1,"response size":6789,"request content":"key:\"/kubernetes.io/clusterroles/cluster-monitoring-operator\" "} 2026-02-24T05:19:13.621506334Z {"level":"warn","ts":"2026-02-24T05:19:13.621460Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"294.15633ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/cluster-node-tuning:tuned\" ","response":"range_response_count:1 size:1256"} 2026-02-24T05:19:13.621562746Z {"level":"info","ts":"2026-02-24T05:19:13.621497Z","caller":"traceutil/trace.go:171","msg":"trace[1515266701] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/cluster-node-tuning:tuned; range_end:; response_count:1; response_revision:9503; }","duration":"294.237982ms","start":"2026-02-24T05:19:13.327248Z","end":"2026-02-24T05:19:13.621486Z","steps":["trace[1515266701] 'agreement among raft nodes before linearized reading' (duration: 294.17274ms)"],"step_count":1} 2026-02-24T05:19:13.621562746Z {"level":"warn","ts":"2026-02-24T05:19:13.621495Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:12.976487Z","time spent":"644.992957ms","remote":"[::1]:34002","response type":"/etcdserverpb.KV/Range","request count":0,"request size":65,"response count":1,"response size":225204,"request content":"key:\"/kubernetes.io/configmaps/openshift-ingress-operator/trusted-ca\" "} 2026-02-24T05:19:13.621562746Z {"level":"warn","ts":"2026-02-24T05:19:13.621533Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"444.292019ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/system:openshift:aggregate-snapshots-to-storage-admin\" ","response":"range_response_count:1 size:1642"} 2026-02-24T05:19:13.621644408Z {"level":"warn","ts":"2026-02-24T05:19:13.621074Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"493.546634ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/oauths.config.openshift.io\" ","response":"range_response_count:1 size:27000"} 2026-02-24T05:19:13.621644408Z {"level":"warn","ts":"2026-02-24T05:19:13.621405Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.295995Z","time spent":"325.28725ms","remote":"[::1]:56210","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":2950,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-02-24T05:19:13.621644408Z {"level":"warn","ts":"2026-02-24T05:19:13.621606Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"468.740427ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/cluster-storage-operator-role\" ","response":"range_response_count:1 size:1445"} 2026-02-24T05:19:13.621789672Z {"level":"info","ts":"2026-02-24T05:19:13.621653Z","caller":"traceutil/trace.go:171","msg":"trace[1845818931] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/cluster-storage-operator-role; range_end:; response_count:1; response_revision:9503; }","duration":"468.835179ms","start":"2026-02-24T05:19:13.152807Z","end":"2026-02-24T05:19:13.621642Z","steps":["trace[1845818931] 'agreement among raft nodes before linearized reading' (duration: 467.999938ms)"],"step_count":1} 2026-02-24T05:19:13.623746502Z {"level":"warn","ts":"2026-02-24T05:19:13.623604Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"396.367727ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/machineconfigs.machineconfiguration.openshift.io\" ","response":"range_response_count:1 size:5701"} 2026-02-24T05:19:13.623746502Z {"level":"info","ts":"2026-02-24T05:19:13.623647Z","caller":"traceutil/trace.go:171","msg":"trace[203397671] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/subscriptions; range_end:; response_count:0; response_revision:9503; }","duration":"130.746561ms","start":"2026-02-24T05:19:13.492877Z","end":"2026-02-24T05:19:13.623624Z","steps":["trace[203397671] 'agreement among raft nodes before linearized reading' (duration: 128.75043ms)"],"step_count":1} 2026-02-24T05:19:13.623746502Z {"level":"info","ts":"2026-02-24T05:19:13.623697Z","caller":"traceutil/trace.go:171","msg":"trace[1411810579] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/machineconfigs.machineconfiguration.openshift.io; range_end:; response_count:1; response_revision:9503; }","duration":"396.427299ms","start":"2026-02-24T05:19:13.227220Z","end":"2026-02-24T05:19:13.623648Z","steps":["trace[1411810579] 'agreement among raft nodes before linearized reading' (duration: 394.379286ms)"],"step_count":1} 2026-02-24T05:19:13.623864075Z {"level":"warn","ts":"2026-02-24T05:19:13.623698Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.152781Z","time spent":"470.886452ms","remote":"[::1]:42650","response type":"/etcdserverpb.KV/Range","request count":0,"request size":66,"response count":1,"response size":1469,"request content":"key:\"/kubernetes.io/clusterrolebindings/cluster-storage-operator-role\" "} 2026-02-24T05:19:13.623864075Z {"level":"warn","ts":"2026-02-24T05:19:13.623742Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.227139Z","time spent":"396.588093ms","remote":"[::1]:34148","response type":"/etcdserverpb.KV/Range","request count":0,"request size":112,"response count":1,"response size":5725,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/machineconfigs.machineconfiguration.openshift.io\" "} 2026-02-24T05:19:13.624182453Z {"level":"info","ts":"2026-02-24T05:19:13.624068Z","caller":"traceutil/trace.go:171","msg":"trace[241970441] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/subscriptions; range_end:; response_count:0; response_revision:9503; }","duration":"531.385108ms","start":"2026-02-24T05:19:13.092070Z","end":"2026-02-24T05:19:13.623455Z","steps":["trace[241970441] 'agreement among raft nodes before linearized reading' (duration: 528.807422ms)"],"step_count":1} 2026-02-24T05:19:13.624233585Z {"level":"warn","ts":"2026-02-24T05:19:13.624179Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.092050Z","time spent":"532.103716ms","remote":"[::1]:55466","response type":"/etcdserverpb.KV/Range","request count":0,"request size":53,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/operators.coreos.com/subscriptions\" limit:1 "} 2026-02-24T05:19:13.624292686Z {"level":"info","ts":"2026-02-24T05:19:13.622411Z","caller":"traceutil/trace.go:171","msg":"trace[733109295] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:aggregate-snapshots-to-storage-admin; range_end:; response_count:1; response_revision:9503; }","duration":"444.345741ms","start":"2026-02-24T05:19:13.177212Z","end":"2026-02-24T05:19:13.621557Z","steps":["trace[733109295] 'agreement among raft nodes before linearized reading' (duration: 444.271929ms)"],"step_count":1} 2026-02-24T05:19:13.624376738Z {"level":"info","ts":"2026-02-24T05:19:13.621090Z","caller":"traceutil/trace.go:171","msg":"trace[1936036797] range","detail":"{range_begin:/kubernetes.io/security.openshift.io/securitycontextconstraints/anyuid; range_end:; response_count:1; response_revision:9503; }","duration":"593.622286ms","start":"2026-02-24T05:19:13.027442Z","end":"2026-02-24T05:19:13.621065Z","steps":["trace[1936036797] 'agreement among raft nodes before linearized reading' (duration: 593.407221ms)"],"step_count":1} 2026-02-24T05:19:13.624418549Z {"level":"warn","ts":"2026-02-24T05:19:13.624358Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.177201Z","time spent":"447.099781ms","remote":"[::1]:42536","response type":"/etcdserverpb.KV/Range","request count":0,"request size":83,"response count":1,"response size":1666,"request content":"key:\"/kubernetes.io/clusterroles/system:openshift:aggregate-snapshots-to-storage-admin\" "} 2026-02-24T05:19:13.624485591Z {"level":"warn","ts":"2026-02-24T05:19:13.624404Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.027424Z","time spent":"596.956922ms","remote":"[::1]:43026","response type":"/etcdserverpb.KV/Range","request count":0,"request size":72,"response count":1,"response size":2308,"request content":"key:\"/kubernetes.io/security.openshift.io/securitycontextconstraints/anyuid\" "} 2026-02-24T05:19:13.624753988Z {"level":"info","ts":"2026-02-24T05:19:13.623103Z","caller":"traceutil/trace.go:171","msg":"trace[605418026] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-marketplace/marketplace-alert-rules; range_end:; response_count:1; response_revision:9503; }","duration":"196.363777ms","start":"2026-02-24T05:19:13.426706Z","end":"2026-02-24T05:19:13.623070Z","steps":["trace[605418026] 'agreement among raft nodes before linearized reading' (duration: 195.588826ms)"],"step_count":1} 2026-02-24T05:19:13.624888591Z {"level":"warn","ts":"2026-02-24T05:19:13.624812Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"454.176863ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook\" ","response":"range_response_count:1 size:5206"} 2026-02-24T05:19:13.624941022Z {"level":"info","ts":"2026-02-24T05:19:13.624895Z","caller":"traceutil/trace.go:171","msg":"trace[547529795] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook; range_end:; response_count:1; response_revision:9503; }","duration":"454.290336ms","start":"2026-02-24T05:19:13.170586Z","end":"2026-02-24T05:19:13.624877Z","steps":["trace[547529795] 'agreement among raft nodes before linearized reading' (duration: 450.94347ms)"],"step_count":1} 2026-02-24T05:19:13.624941022Z {"level":"warn","ts":"2026-02-24T05:19:13.623256Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"221.504823ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/secrets/openshift-operator-lifecycle-manager/pprof-cert\" ","response":"range_response_count:1 size:1256"} 2026-02-24T05:19:13.624982064Z {"level":"warn","ts":"2026-02-24T05:19:13.624941Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.170566Z","time spent":"454.364647ms","remote":"[::1]:34044","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":5230,"request content":"key:\"/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook\" "} 2026-02-24T05:19:13.625049975Z {"level":"info","ts":"2026-02-24T05:19:13.624985Z","caller":"traceutil/trace.go:171","msg":"trace[543975065] range","detail":"{range_begin:/kubernetes.io/secrets/openshift-operator-lifecycle-manager/pprof-cert; range_end:; response_count:1; response_revision:9503; }","duration":"223.266278ms","start":"2026-02-24T05:19:13.401682Z","end":"2026-02-24T05:19:13.624948Z","steps":["trace[543975065] 'agreement among raft nodes before linearized reading' (duration: 221.497833ms)"],"step_count":1} 2026-02-24T05:19:13.625828086Z {"level":"warn","ts":"2026-02-24T05:19:13.625748Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"444.086314ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusterversions/version\" ","response":"range_response_count:1 size:5481"} 2026-02-24T05:19:13.625828086Z {"level":"info","ts":"2026-02-24T05:19:13.625803Z","caller":"traceutil/trace.go:171","msg":"trace[926727076] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:9503; }","duration":"444.196077ms","start":"2026-02-24T05:19:13.181594Z","end":"2026-02-24T05:19:13.625790Z","steps":["trace[926727076] 'agreement among raft nodes before linearized reading' (duration: 439.983148ms)"],"step_count":1} 2026-02-24T05:19:13.625873357Z {"level":"warn","ts":"2026-02-24T05:19:13.625850Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.181572Z","time spent":"444.258158ms","remote":"[::1]:42894","response type":"/etcdserverpb.KV/Range","request count":0,"request size":60,"response count":1,"response size":5505,"request content":"key:\"/kubernetes.io/config.openshift.io/clusterversions/version\" "} 2026-02-24T05:19:13.626047112Z {"level":"warn","ts":"2026-02-24T05:19:13.625979Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"373.820668ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-config/cluster-samples-operator-openshift-config-secret-reader\" ","response":"range_response_count:1 size:1136"} 2026-02-24T05:19:13.626128604Z {"level":"info","ts":"2026-02-24T05:19:13.626074Z","caller":"traceutil/trace.go:171","msg":"trace[931409933] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-config/cluster-samples-operator-openshift-config-secret-reader; range_end:; response_count:1; response_revision:9503; }","duration":"373.935321ms","start":"2026-02-24T05:19:13.252101Z","end":"2026-02-24T05:19:13.626036Z","steps":["trace[931409933] 'agreement among raft nodes before linearized reading' (duration: 369.488767ms)"],"step_count":1} 2026-02-24T05:19:13.626184825Z {"level":"warn","ts":"2026-02-24T05:19:13.626134Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.252074Z","time spent":"374.044773ms","remote":"[::1]:42834","response type":"/etcdserverpb.KV/Range","request count":0,"request size":102,"response count":1,"response size":1160,"request content":"key:\"/kubernetes.io/rolebindings/openshift-config/cluster-samples-operator-openshift-config-secret-reader\" "} 2026-02-24T05:19:13.626678328Z {"level":"warn","ts":"2026-02-24T05:19:13.626623Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"347.988984ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-console/prometheus-k8s\" ","response":"range_response_count:0 size:5"} 2026-02-24T05:19:13.626790060Z {"level":"info","ts":"2026-02-24T05:19:13.626756Z","caller":"traceutil/trace.go:171","msg":"trace[727749122] range","detail":"{range_begin:/kubernetes.io/roles/openshift-console/prometheus-k8s; range_end:; response_count:0; response_revision:9503; }","duration":"348.098487ms","start":"2026-02-24T05:19:13.278618Z","end":"2026-02-24T05:19:13.626717Z","steps":["trace[727749122] 'agreement among raft nodes before linearized reading' (duration: 342.967494ms)"],"step_count":1} 2026-02-24T05:19:13.626863422Z {"level":"warn","ts":"2026-02-24T05:19:13.626831Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.278556Z","time spent":"348.26408ms","remote":"[::1]:34500","response type":"/etcdserverpb.KV/Range","request count":0,"request size":55,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/roles/openshift-console/prometheus-k8s\" "} 2026-02-24T05:19:13.626981325Z {"level":"warn","ts":"2026-02-24T05:19:13.626916Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"324.922791ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-console-operator/prometheus-k8s\" ","response":"range_response_count:0 size:5"} 2026-02-24T05:19:13.627007576Z {"level":"warn","ts":"2026-02-24T05:19:13.620979Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"558.974947ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiregistration.k8s.io/apiservices/v1.authorization.openshift.io\" ","response":"range_response_count:1 size:3477"} 2026-02-24T05:19:13.627020346Z {"level":"info","ts":"2026-02-24T05:19:13.626985Z","caller":"traceutil/trace.go:171","msg":"trace[973921979] range","detail":"{range_begin:/kubernetes.io/roles/openshift-console-operator/prometheus-k8s; range_end:; response_count:0; response_revision:9503; }","duration":"325.028734ms","start":"2026-02-24T05:19:13.301935Z","end":"2026-02-24T05:19:13.626963Z","steps":["trace[973921979] 'agreement among raft nodes before linearized reading' (duration: 319.681446ms)"],"step_count":1} 2026-02-24T05:19:13.627101608Z {"level":"warn","ts":"2026-02-24T05:19:13.627048Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.301915Z","time spent":"325.103315ms","remote":"[::1]:34500","response type":"/etcdserverpb.KV/Range","request count":0,"request size":64,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/roles/openshift-console-operator/prometheus-k8s\" "} 2026-02-24T05:19:13.627101608Z {"level":"info","ts":"2026-02-24T05:19:13.627058Z","caller":"traceutil/trace.go:171","msg":"trace[1479674003] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/v1.authorization.openshift.io; range_end:; response_count:1; response_revision:9503; }","duration":"565.052813ms","start":"2026-02-24T05:19:13.061946Z","end":"2026-02-24T05:19:13.626998Z","steps":["trace[1479674003] 'agreement among raft nodes before linearized reading' (duration: 558.868804ms)"],"step_count":1} 2026-02-24T05:19:13.627186020Z {"level":"warn","ts":"2026-02-24T05:19:13.627129Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.061925Z","time spent":"565.184126ms","remote":"[::1]:42876","response type":"/etcdserverpb.KV/Range","request count":0,"request size":81,"response count":1,"response size":3501,"request content":"key:\"/kubernetes.io/apiregistration.k8s.io/apiservices/v1.authorization.openshift.io\" "} 2026-02-24T05:19:13.627550280Z {"level":"info","ts":"2026-02-24T05:19:13.627491Z","caller":"traceutil/trace.go:171","msg":"trace[1343020590] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/oauths.config.openshift.io; range_end:; response_count:1; response_revision:9503; }","duration":"494.150989ms","start":"2026-02-24T05:19:13.127469Z","end":"2026-02-24T05:19:13.621620Z","steps":["trace[1343020590] 'agreement among raft nodes before linearized reading' (duration: 493.537064ms)"],"step_count":1} 2026-02-24T05:19:13.627577880Z {"level":"warn","ts":"2026-02-24T05:19:13.627550Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-24T05:19:13.127443Z","time spent":"500.093122ms","remote":"[::1]:34148","response type":"/etcdserverpb.KV/Range","request count":0,"request size":90,"response count":1,"response size":27024,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/oauths.config.openshift.io\" "} 2026-02-24T05:19:13.628049922Z {"level":"warn","ts":"2026-02-24T05:19:13.627993Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"249.935034ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-image-registry/node-ca\" ","response":"range_response_count:1 size:1160"} 2026-02-24T05:19:13.628078273Z {"level":"info","ts":"2026-02-24T05:19:13.628049Z","caller":"traceutil/trace.go:171","msg":"trace[212375127] range","detail":"{range_begin:/kubernetes.io/roles/openshift-image-registry/node-ca; range_end:; response_count:1; response_revision:9503; }","duration":"250.020816ms","start":"2026-02-24T05:19:13.378001Z","end":"2026-02-24T05:19:13.628022Z","steps":["trace[212375127] 'agreement among raft nodes before linearized reading' (duration: 243.610131ms)"],"step_count":1} 2026-02-24T05:19:13.858924786Z {"level":"info","ts":"2026-02-24T05:19:13.858719Z","caller":"traceutil/trace.go:171","msg":"trace[1963387664] linearizableReadLoop","detail":"{readStateIndex:9949; appliedIndex:9948; }","duration":"163.576464ms","start":"2026-02-24T05:19:13.695112Z","end":"2026-02-24T05:19:13.858688Z","steps":["trace[1963387664] 'read index received' (duration: 99.382524ms)","trace[1963387664] 'applied index is now lower than readState.Index' (duration: 64.19151ms)"],"step_count":2} 2026-02-24T05:19:13.858924786Z {"level":"info","ts":"2026-02-24T05:19:13.858805Z","caller":"traceutil/trace.go:171","msg":"trace[1098466126] transaction","detail":"{read_only:false; number_of_response:0; response_revision:9503; }","duration":"164.065166ms","start":"2026-02-24T05:19:13.694710Z","end":"2026-02-24T05:19:13.858775Z","steps":["trace[1098466126] 'process raft request' (duration: 99.856546ms)","trace[1098466126] 'compare' (duration: 64.055407ms)"],"step_count":2} 2026-02-24T05:19:13.859022659Z {"level":"info","ts":"2026-02-24T05:19:13.858932Z","caller":"traceutil/trace.go:171","msg":"trace[608297916] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:9503; }","duration":"163.847101ms","start":"2026-02-24T05:19:13.695070Z","end":"2026-02-24T05:19:13.858917Z","steps":["trace[608297916] 'agreement among raft nodes before linearized reading' (duration: 163.81532ms)"],"step_count":1} 2026-02-24T05:19:13.859258305Z {"level":"info","ts":"2026-02-24T05:19:13.859108Z","caller":"traceutil/trace.go:171","msg":"trace[52179579] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations/performance-addon-operator; range_end:; response_count:1; response_revision:9503; }","duration":"157.450486ms","start":"2026-02-24T05:19:13.701616Z","end":"2026-02-24T05:19:13.859066Z","steps":["trace[52179579] 'agreement among raft nodes before linearized reading' (duration: 157.363904ms)"],"step_count":1} 2026-02-24T05:19:13.859490521Z {"level":"info","ts":"2026-02-24T05:19:13.859414Z","caller":"traceutil/trace.go:171","msg":"trace[611204789] range","detail":"{range_begin:/kubernetes.io/rolebindings/kube-system/cloud-controller-manager; range_end:; response_count:1; response_revision:9503; }","duration":"106.981579ms","start":"2026-02-24T05:19:13.752410Z","end":"2026-02-24T05:19:13.859392Z","steps":["trace[611204789] 'agreement among raft nodes before linearized reading' (duration: 106.894897ms)"],"step_count":1} 2026-02-24T05:19:13.859686026Z {"level":"info","ts":"2026-02-24T05:19:13.859417Z","caller":"traceutil/trace.go:171","msg":"trace[1859334466] range","detail":"{range_begin:/kubernetes.io/security.openshift.io/securitycontextconstraints/hostaccess; range_end:; response_count:1; response_revision:9503; }","duration":"132.662769ms","start":"2026-02-24T05:19:13.726734Z","end":"2026-02-24T05:19:13.859397Z","steps":["trace[1859334466] 'agreement among raft nodes before linearized reading' (duration: 132.618688ms)"],"step_count":1} 2026-02-24T05:19:19.340532255Z {"level":"info","ts":"2026-02-24T05:19:19.340424Z","caller":"etcdserver/server.go:1482","msg":"triggering snapshot","local-member-id":"91eb892c5ee87610","local-member-applied-index":10001,"local-member-snapshot-index":0,"local-member-snapshot-count":10000} 2026-02-24T05:19:19.345176864Z {"level":"info","ts":"2026-02-24T05:19:19.345097Z","caller":"etcdserver/server.go:2503","msg":"saved snapshot","snapshot-index":10001} 2026-02-24T05:19:19.345223055Z {"level":"info","ts":"2026-02-24T05:19:19.345207Z","caller":"etcdserver/server.go:2533","msg":"compacted Raft logs","compact-index":5001} 2026-02-24T05:19:28.276659145Z {"level":"info","ts":"2026-02-24T05:19:28.276446Z","caller":"traceutil/trace.go:171","msg":"trace[959219354] linearizableReadLoop","detail":"{readStateIndex:10522; appliedIndex:10521; }","duration":"193.146073ms","start":"2026-02-24T05:19:28.083268Z","end":"2026-02-24T05:19:28.276414Z","steps":["trace[959219354] 'read index received' (duration: 192.909247ms)","trace[959219354] 'applied index is now lower than readState.Index' (duration: 235.276µs)"],"step_count":2} 2026-02-24T05:19:28.276763057Z {"level":"info","ts":"2026-02-24T05:19:28.276592Z","caller":"traceutil/trace.go:171","msg":"trace[86644273] transaction","detail":"{read_only:false; response_revision:10010; number_of_response:1; }","duration":"193.78375ms","start":"2026-02-24T05:19:28.082688Z","end":"2026-02-24T05:19:28.276471Z","steps":["trace[86644273] 'process raft request' (duration: 193.470002ms)"],"step_count":1} 2026-02-24T05:19:28.276763057Z {"level":"info","ts":"2026-02-24T05:19:28.276689Z","caller":"traceutil/trace.go:171","msg":"trace[1968278501] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-route-controller-manager/prometheus-k8s; range_end:; response_count:1; response_revision:10010; }","duration":"193.399651ms","start":"2026-02-24T05:19:28.083256Z","end":"2026-02-24T05:19:28.276656Z","steps":["trace[1968278501] 'agreement among raft nodes before linearized reading' (duration: 193.296288ms)"],"step_count":1} 2026-02-24T05:19:28.280502174Z {"level":"info","ts":"2026-02-24T05:19:28.280365Z","caller":"traceutil/trace.go:171","msg":"trace[1861969074] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:kube-scheduler:public-2; range_end:; response_count:1; response_revision:10011; }","duration":"196.5021ms","start":"2026-02-24T05:19:28.083840Z","end":"2026-02-24T05:19:28.280343Z","steps":["trace[1861969074] 'agreement among raft nodes before linearized reading' (duration: 196.413768ms)"],"step_count":1} 2026-02-24T05:19:28.280739380Z {"level":"info","ts":"2026-02-24T05:19:28.280667Z","caller":"traceutil/trace.go:171","msg":"trace[1872313328] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook; range_end:; response_count:1; response_revision:10011; }","duration":"110.749627ms","start":"2026-02-24T05:19:28.169909Z","end":"2026-02-24T05:19:28.280658Z","steps":["trace[1872313328] 'agreement among raft nodes before linearized reading' (duration: 110.712726ms)"],"step_count":1} 2026-02-24T05:19:28.280906364Z {"level":"info","ts":"2026-02-24T05:19:28.280844Z","caller":"traceutil/trace.go:171","msg":"trace[8553488] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-cloud-credential-operator/cloud-credential-operator; range_end:; response_count:1; response_revision:10011; }","duration":"119.782679ms","start":"2026-02-24T05:19:28.161054Z","end":"2026-02-24T05:19:28.280837Z","steps":["trace[8553488] 'agreement among raft nodes before linearized reading' (duration: 119.748598ms)"],"step_count":1} 2026-02-24T05:19:28.281010287Z {"level":"info","ts":"2026-02-24T05:19:28.280932Z","caller":"traceutil/trace.go:171","msg":"trace[395577379] range","detail":"{range_begin:/kubernetes.io/pods/openshift-oauth-apiserver/apiserver-6f8b7f45f7-5df4m; range_end:; response_count:1; response_revision:10011; }","duration":"182.005848ms","start":"2026-02-24T05:19:28.098908Z","end":"2026-02-24T05:19:28.280914Z","steps":["trace[395577379] 'agreement among raft nodes before linearized reading' (duration: 181.973487ms)"],"step_count":1} 2026-02-24T05:19:28.281035908Z {"level":"info","ts":"2026-02-24T05:19:28.281004Z","caller":"traceutil/trace.go:171","msg":"trace[1458197569] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-oauth-apiserver/openshift-oauth-apiserver; range_end:; response_count:1; response_revision:10011; }","duration":"194.55832ms","start":"2026-02-24T05:19:28.086437Z","end":"2026-02-24T05:19:28.280995Z","steps":["trace[1458197569] 'agreement among raft nodes before linearized reading' (duration: 194.527139ms)"],"step_count":1} 2026-02-24T05:19:28.281148330Z {"level":"info","ts":"2026-02-24T05:19:28.281101Z","caller":"traceutil/trace.go:171","msg":"trace[737838335] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/olms/cluster; range_end:; response_count:1; response_revision:10011; }","duration":"140.104871ms","start":"2026-02-24T05:19:28.140988Z","end":"2026-02-24T05:19:28.281093Z","steps":["trace[737838335] 'agreement among raft nodes before linearized reading' (duration: 140.07625ms)"],"step_count":1} 2026-02-24T05:19:28.281271914Z {"level":"info","ts":"2026-02-24T05:19:28.281166Z","caller":"traceutil/trace.go:171","msg":"trace[1117599624] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-apiserver/apiserver; range_end:; response_count:1; response_revision:10011; }","duration":"195.039063ms","start":"2026-02-24T05:19:28.086113Z","end":"2026-02-24T05:19:28.281152Z","steps":["trace[1117599624] 'agreement among raft nodes before linearized reading' (duration: 194.995081ms)"],"step_count":1} 2026-02-24T05:19:28.281271914Z {"level":"info","ts":"2026-02-24T05:19:28.281250Z","caller":"traceutil/trace.go:171","msg":"trace[589769039] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-marketplace/marketplace-operator; range_end:; response_count:1; response_revision:10011; }","duration":"144.887824ms","start":"2026-02-24T05:19:28.136352Z","end":"2026-02-24T05:19:28.281240Z","steps":["trace[589769039] 'agreement among raft nodes before linearized reading' (duration: 144.842153ms)"],"step_count":1} 2026-02-24T05:19:28.281448948Z {"level":"info","ts":"2026-02-24T05:19:28.281363Z","caller":"traceutil/trace.go:171","msg":"trace[1190675740] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-pod; range_end:; response_count:1; response_revision:10011; }","duration":"168.674684ms","start":"2026-02-24T05:19:28.112671Z","end":"2026-02-24T05:19:28.281345Z","steps":["trace[1190675740] 'agreement among raft nodes before linearized reading' (duration: 168.576492ms)"],"step_count":1} 2026-02-24T05:19:28.281558621Z {"level":"info","ts":"2026-02-24T05:19:28.281394Z","caller":"traceutil/trace.go:171","msg":"trace[1254139877] range","detail":"{range_begin:/kubernetes.io/secrets/openshift-machine-config-operator/machine-config-server-dockercfg-rzbrp; range_end:; response_count:0; response_revision:10011; }","duration":"196.199292ms","start":"2026-02-24T05:19:28.085186Z","end":"2026-02-24T05:19:28.281385Z","steps":["trace[1254139877] 'agreement among raft nodes before linearized reading' (duration: 196.182722ms)"],"step_count":1} 2026-02-24T05:19:28.281607392Z {"level":"info","ts":"2026-02-24T05:19:28.281554Z","caller":"traceutil/trace.go:171","msg":"trace[359163653] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:10011; }","duration":"155.233339ms","start":"2026-02-24T05:19:28.126304Z","end":"2026-02-24T05:19:28.281537Z","steps":["trace[359163653] 'agreement among raft nodes before linearized reading' (duration: 155.199198ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715147232357023133 0ustar00000000000000002026-02-24T05:15:43.341000925Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-6f8b7f45f7-5df4m/oauth-apiserver_current.log0000640000000000000000000011414315147232357031271 0ustar00000000000000002026-02-24T05:17:45.159389702Z E0224 05:17:45.159362 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.163351943Z E0224 05:17:45.159774 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.163351943Z E0224 05:17:45.159831 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.163351943Z E0224 05:17:45.160096 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.163351943Z E0224 05:17:45.160386 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.171388366Z E0224 05:17:45.168537 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.171388366Z E0224 05:17:45.169627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.171388366Z E0224 05:17:45.170486 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.171388366Z E0224 05:17:45.170967 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.174712750Z E0224 05:17:45.171496 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.187364742Z E0224 05:17:45.187236 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.188024038Z E0224 05:17:45.187959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.198712809Z E0224 05:17:45.198636 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.305747772Z E0224 05:17:45.305622 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.312516604Z E0224 05:17:45.312419 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.325480132Z E0224 05:17:45.325381 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:45.338489882Z E0224 05:17:45.337840 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:50.073128814Z E0224 05:17:50.072972 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:50.073375420Z E0224 05:17:50.073247 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:50.073568085Z E0224 05:17:50.073246 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:50.078363876Z E0224 05:17:50.078254 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:50.078580282Z E0224 05:17:50.078487 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:50.105027022Z E0224 05:17:50.104906 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:50.105070593Z E0224 05:17:50.105028 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:50.105127684Z E0224 05:17:50.105081 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:50.105409912Z E0224 05:17:50.105275 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:50.111498236Z E0224 05:17:50.111371 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:17:54.540055402Z W0224 05:17:54.539927 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-24T05:17:55.542167479Z W0224 05:17:55.542033 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-24T05:17:56.893790114Z W0224 05:17:56.893679 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-24T05:17:59.259981612Z W0224 05:17:59.259886 1 logging.go:55] [core] [Channel #41 SubChannel #42]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-02-24T05:18:15.181420260Z E0224 05:18:15.178673 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:15.181420260Z E0224 05:18:15.178803 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:15.181420260Z E0224 05:18:15.178910 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:15.181420260Z E0224 05:18:15.178935 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:15.181420260Z E0224 05:18:15.179118 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:15.181420260Z E0224 05:18:15.179366 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:15.181420260Z E0224 05:18:15.179413 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:15.181420260Z E0224 05:18:15.179560 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:15.181420260Z E0224 05:18:15.179683 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:15.181420260Z E0224 05:18:15.180042 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:20.094367253Z E0224 05:18:20.094238 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:20.094564698Z E0224 05:18:20.094484 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:20.094673731Z E0224 05:18:20.094614 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:20.094899337Z E0224 05:18:20.094834 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:20.095070051Z E0224 05:18:20.094842 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:20.115656758Z E0224 05:18:20.115562 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:20.115736291Z E0224 05:18:20.115705 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:20.115842313Z E0224 05:18:20.115764 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:20.115842313Z E0224 05:18:20.115793 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:20.116029048Z E0224 05:18:20.115773 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:45.276549603Z E0224 05:18:45.276402 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:45.289149607Z E0224 05:18:45.289044 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:45.328606996Z E0224 05:18:45.328401 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:45.339976309Z E0224 05:18:45.339906 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:46.180830141Z E0224 05:18:46.179117 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:46.180830141Z E0224 05:18:46.179184 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:46.180830141Z E0224 05:18:46.179682 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:46.180830141Z E0224 05:18:46.179926 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:46.180830141Z E0224 05:18:46.180501 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:46.181576770Z E0224 05:18:46.181476 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:46.181576770Z E0224 05:18:46.181522 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:46.181635542Z E0224 05:18:46.181569 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:46.181635542Z E0224 05:18:46.181575 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:46.182799712Z E0224 05:18:46.182231 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:50.107083682Z E0224 05:18:50.106998 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:50.107083682Z E0224 05:18:50.107069 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:50.107301138Z E0224 05:18:50.107250 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:50.107350979Z E0224 05:18:50.107296 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:50.107397570Z E0224 05:18:50.107263 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:50.131446900Z E0224 05:18:50.128727 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:50.131446900Z E0224 05:18:50.128978 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:50.131994794Z E0224 05:18:50.131931 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:50.133854484Z E0224 05:18:50.133798 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:18:50.133940396Z E0224 05:18:50.133905 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:08.299735956Z I0224 05:19:08.299657 1 policy_source.go:224] refreshing policies 2026-02-24T05:19:15.163388770Z E0224 05:19:15.162405 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.163388770Z E0224 05:19:15.162848 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.163388770Z E0224 05:19:15.163030 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.163388770Z E0224 05:19:15.163253 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.163460762Z E0224 05:19:15.163451 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.163902645Z E0224 05:19:15.163864 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.164029338Z E0224 05:19:15.163995 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.164103710Z E0224 05:19:15.164080 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.164210372Z E0224 05:19:15.164176 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:15.168003019Z E0224 05:19:15.166512 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.116327682Z E0224 05:19:20.115751 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.116327682Z E0224 05:19:20.116093 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.116327682Z E0224 05:19:20.116253 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.116712033Z E0224 05:19:20.116445 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.116712033Z E0224 05:19:20.116624 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.148113240Z E0224 05:19:20.148029 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.148113240Z E0224 05:19:20.148057 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.148345716Z E0224 05:19:20.148322 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.149273839Z E0224 05:19:20.148482 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:20.149273839Z E0224 05:19:20.148579 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1124998303393577583, SKID=32:82:05:FA:08:78:AA:7A:65:E6:91:8E:DB:30:7D:A3:AD:77:10:E3, AKID=87:9E:63:0E:82:54:88:09:16:B5:6D:4D:05:1C:52:EE:D8:7B:0D:B2 failed: x509: certificate signed by unknown authority]" 2026-02-24T05:19:23.319930796Z I0224 05:19:23.319589 1 policy_source.go:224] refreshing policies 2026-02-24T05:19:24.320234504Z I0224 05:19:24.319982 1 policy_source.go:224] refreshing policies 2026-02-24T05:19:24.343940694Z I0224 05:19:24.343678 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-02-24T05:19:24.347269229Z I0224 05:19:24.346263 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 config/pod/openshift-ingress/router-default-7b65dc9fcb-zxkt2.json0000640000000000000000000001534215147232357023425 0ustar0000000000000000{"metadata":{"name":"router-default-7b65dc9fcb-zxkt2","generateName":"router-default-7b65dc9fcb-","namespace":"openshift-ingress","uid":"be7a4b9e-1e9a-4298-b804-21b683805c0e","resourceVersion":"5333","creationTimestamp":"2026-02-24T05:14:54Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"6b694f4697","pod-template-hash":"7b65dc9fcb"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-7b65dc9fcb","uid":"02894775-8d61-477a-9704-16d7314d6c8f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-wvm29","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-wvm29","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000640000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c25,c20"},"supplementalGroups":[1000640000],"fsGroup":1000640000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["6b694f4697"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:54Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000013655615147232357037400 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5bd7c86784-kbb8z2026-02-24T05:18:29.341964928Z I0224 05:18:29.341818 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed 2026-02-24T05:18:31.423623147Z E0224 05:18:31.423528 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-24T05:18:31.429692179Z E0224 05:18:31.429620 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver), \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver), \"oauth-apiserver/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services api)]" 2026-02-24T05:18:31.430224863Z E0224 05:18:31.430167 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused" 2026-02-24T05:18:32.424853983Z W0224 05:18:32.424687 1 dynamic_operator_client.go:355] .status.conditions["APIServerStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-02-24T05:18:32.465458803Z E0224 05:18:32.465288 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-24T05:18:32.474456252Z E0224 05:18:32.474291 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused" 2026-02-24T05:18:34.643615247Z W0224 05:18:34.643497 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-02-24T05:18:34.643615247Z E0224 05:18:34.643581 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-02-24T05:18:37.191966866Z E0224 05:18:37.191871 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get endpoints oauth-openshift)" 2026-02-24T05:18:42.002674569Z I0224 05:18:42.001815 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:18:42Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:18:42Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"oauth-apiserver","version":"4.18.33"}]}} 2026-02-24T05:18:42.002674569Z I0224 05:18:42.002476 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded changed from False to True ("IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready") 2026-02-24T05:18:42.002674569Z I0224 05:18:42.002503 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/authentication version "oauth-apiserver" changed from "" to "4.18.33" 2026-02-24T05:18:42.025192418Z E0224 05:18:42.021818 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-24T05:18:42.029874563Z I0224 05:18:42.029751 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/authentication version "oauth-apiserver" changed from "" to "4.18.33" 2026-02-24T05:18:42.030357956Z I0224 05:18:42.030281 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:18:42Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:18:42Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"oauth-apiserver","version":"4.18.33"}]}} 2026-02-24T05:18:42.051898599Z E0224 05:18:42.051187 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-24T05:18:42.067676448Z I0224 05:18:42.067453 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/authentication version "oauth-apiserver" changed from "" to "4.18.33" 2026-02-24T05:18:42.067839782Z I0224 05:18:42.067773 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:18:42Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:18:42Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"oauth-apiserver","version":"4.18.33"}]}} 2026-02-24T05:18:42.083017396Z E0224 05:18:42.082289 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-24T05:18:42.084752792Z I0224 05:18:42.084685 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:18:19Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:18:42Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"oauth-apiserver","version":"4.18.33"}]}} 2026-02-24T05:18:42.085494062Z I0224 05:18:42.085397 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/authentication version "oauth-apiserver" changed from "" to "4.18.33" 2026-02-24T05:18:42.104362533Z I0224 05:18:42.104095 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Progressing changed from True to False ("AuthenticatorCertKeyProgressing: All is well"),Available message changed from "APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." to "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).",status.versions changed from [{"operator" "4.18.33"}] to [{"operator" "4.18.33"} {"oauth-apiserver" "4.18.33"}] 2026-02-24T05:18:44.891852483Z W0224 05:18:44.891731 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-24T05:18:44.891852483Z E0224 05:18:44.891824 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-02-24T05:18:47.103533008Z E0224 05:18:47.103172 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-24T05:18:48.131123175Z I0224 05:18:48.130918 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:18:19Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/serviceaccount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/oauth-service.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services oauth-openshift)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/trust_distribution_role.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:oauth-servercert-trust)\nOpenshiftAuthenticationStaticResourcesDegraded: ","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError::OpenshiftAuthenticationStaticResources_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:18:42Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-24T05:18:48.134545366Z E0224 05:18:48.134452 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/serviceaccount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift), \"oauth-openshift/oauth-service.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services oauth-openshift), \"oauth-openshift/trust_distribution_role.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:oauth-servercert-trust)]" 2026-02-24T05:18:48.140018351Z E0224 05:18:48.136466 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-24T05:18:48.149512424Z I0224 05:18:48.149428 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" to "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/serviceaccount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/oauth-service.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services oauth-openshift)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/trust_distribution_role.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:oauth-servercert-trust)\nOpenshiftAuthenticationStaticResourcesDegraded: " 2026-02-24T05:18:48.162414917Z E0224 05:18:48.161347 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused" 2026-02-24T05:18:48.743825759Z W0224 05:18:48.743701 1 dynamic_operator_client.go:355] .status.conditions["OpenshiftAuthenticationStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-02-24T05:18:48.787462099Z E0224 05:18:48.787335 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-24T05:18:48.788493196Z I0224 05:18:48.788407 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:18:19Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:18:42Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-24T05:18:48.790657064Z E0224 05:18:48.790592 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused" 2026-02-24T05:18:48.801020500Z I0224 05:18:48.800917 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/serviceaccount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/oauth-service.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services oauth-openshift)\nOpenshiftAuthenticationStaticResourcesDegraded: \"oauth-openshift/trust_distribution_role.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:oauth-servercert-trust)\nOpenshiftAuthenticationStaticResourcesDegraded: " to "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" 2026-02-24T05:18:49.835017597Z E0224 05:18:49.834900 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:18:49.835017597Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:18:49.835017597Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:18:49.835017597Z > 2026-02-24T05:18:49.844895080Z E0224 05:18:49.844841 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:18:49.844895080Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:18:49.844895080Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:18:49.844895080Z > 2026-02-24T05:18:49.932788067Z I0224 05:18:49.932667 1 request.go:700] Waited for 1.131701175s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication-operator/events 2026-02-24T05:18:50.166863462Z E0224 05:18:50.166735 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:18:50.166863462Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:18:50.166863462Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:18:50.166863462Z > 2026-02-24T05:18:50.932937235Z I0224 05:18:50.932794 1 request.go:700] Waited for 1.196077108s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/etcd-serving-ca 2026-02-24T05:18:51.459245711Z E0224 05:18:51.459120 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:18:51.459245711Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:18:51.459245711Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:18:51.459245711Z > 2026-02-24T05:18:54.030011817Z E0224 05:18:54.029915 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:18:54.030011817Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:18:54.030011817Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:18:54.030011817Z > 2026-02-24T05:18:58.540526967Z E0224 05:18:58.540424 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:18:58.540526967Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:18:58.540526967Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:18:58.540526967Z > 2026-02-24T05:18:59.162644171Z E0224 05:18:59.162523 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:18:59.162644171Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:18:59.162644171Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:18:59.162644171Z > 2026-02-24T05:19:06.612108917Z E0224 05:19:06.612033 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:06.612108917Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:19:06.612108917Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:19:06.612108917Z > 2026-02-24T05:19:06.627498476Z E0224 05:19:06.627448 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:06.627498476Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:19:06.627498476Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:19:06.627498476Z > 2026-02-24T05:19:08.541373853Z E0224 05:19:08.541262 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:08.541373853Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:19:08.541373853Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:19:08.541373853Z > 2026-02-24T05:19:18.541602701Z E0224 05:19:18.541495 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:18.541602701Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:19:18.541602701Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:19:18.541602701Z > 2026-02-24T05:19:19.228878715Z W0224 05:19:19.228111 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-02-24T05:19:19.228878715Z E0224 05:19:19.228167 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-02-24T05:19:19.430388124Z W0224 05:19:19.430004 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-24T05:19:19.430388124Z E0224 05:19:19.430067 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-02-24T05:19:19.666762579Z E0224 05:19:19.665782 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:19.666762579Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:19:19.666762579Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:19:19.666762579Z > 2026-02-24T05:19:21.005632328Z E0224 05:19:21.005569 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-24T05:19:21.005632328Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401 2026-02-24T05:19:21.005632328Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401 2026-02-24T05:19:21.005632328Z > 2026-02-24T05:19:25.254325331Z W0224 05:19:25.254245 1 dynamic_operator_client.go:352] .status.conditions["ReadyIngressNodesAvailable"].reason is missing; this will eventually be fatal 2026-02-24T05:19:25.254325331Z W0224 05:19:25.254273 1 dynamic_operator_client.go:355] .status.conditions["ReadyIngressNodesAvailable"].message is missing; this will eventually be fatal 2026-02-24T05:19:25.301367859Z I0224 05:19:25.301278 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T05:18:19Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-24T05:18:42Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-24T05:14:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-24T05:19:25.302845948Z E0224 05:19:25.302808 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-24T05:19:25.320223774Z I0224 05:19:25.319911 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." to "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found" 2026-02-24T05:19:25.324734100Z E0224 05:19:25.324605 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused" events/openshift-operator-lifecycle-manager.json0000640000000000000000000002312215147232357020645 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:09:35Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:09:47Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-5c75f78c8b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:09:48Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c75f78c8b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:13:04Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:13:06Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c75f78c8b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:13:08Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-5c75f78c8b-9d82f","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:14:45Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:15:00Z","reason":"SuccessfulCreate","message":"Created pod: collect-profiles-29531835-tsgrz","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:15:00Z","reason":"SuccessfulCreate","message":"Created job collect-profiles-29531835","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:15:02Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:15:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:15:07Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:15:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:15:07Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:15:17Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" in 10.866s (10.866s including waiting). Image size: 862501144 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:15:18Z","reason":"LeaderElection","message":"package-server-manager-5c75f78c8b-9d82f_8891dc3b-a5f0-4335-9a00-ffdb5d70df9f became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:01Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-596f79dd6f-v22h2","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:01Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-5499d7f7bb-8xdmq","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:01Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-5499d7f7bb to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:01Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-596f79dd6f to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:01Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:04Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.58/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:04Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.55/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:04Z","reason":"RequirementsUnknown","message":"requirements not yet checked","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:04Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:04Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:04Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:04Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:06Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-df5f88cd4-cwzcs","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:06Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-df5f88cd4 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:06Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:07Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.61/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:20Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:20Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:26Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.66/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:26Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:26Z","reason":"Created","message":"Created container: collect-profiles","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-24T05:19:26Z","reason":"Started","message":"Started container collect-profiles","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000000705515147232357015454 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:14:58Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-786f58c449-64k2s","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:14:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-786f58c449 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:04Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-786f58c449 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:05Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-786f58c449-64k2s","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:05Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-fdc9d7cdd to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:06Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-fdc9d7cdd-8v72m","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:10Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:10Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:17Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\" in 7.194s (7.194s including waiting). Image size: 589275174 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:19Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:19Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:19Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-24T05:15:19Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"}]}events/openshift-apiserver-operator.json0000640000000000000000000012476415147232357017314 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:09:32Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-8586dccc9b to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:09:42Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-8586dccc9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:13:06Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-8586dccc9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:13:08Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-8586dccc9b-49fsv","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.16/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:32Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:32Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\" in 767ms (767ms including waiting). Image size: 512172666 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"LeaderElection","message":"openshift-apiserver-operator-8586dccc9b-49fsv_baba0acb-0f31-441d-be3f-bac450640357 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n  }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-apiserver: namespaces \"openshift-apiserver\" not found","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:52Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:53Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:55Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:55Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:57Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:14:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"All is well\",Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:03Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:24Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:24Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:24Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:24Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:24Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:24Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:24Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.33\"}] to [{\"operator\" \"4.18.33\"} {\"openshift-apiserver\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:24Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:15:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:18:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"APIServerDeploymentDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get openshiftapiservers.operator.openshift.io cluster)\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get openshiftapiservers.operator.openshift.io cluster)\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:18:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get openshiftapiservers.operator.openshift.io cluster)\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get openshiftapiservers.operator.openshift.io cluster)\\nAPIServerWorkloadDegraded: \" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:18:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401\" to \"APIServicesAvailable: [the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.image.openshift.io), the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.project.openshift.io), the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.quota.openshift.io)]\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-24T05:18:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: [the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.image.openshift.io), the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.project.openshift.io), the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.quota.openshift.io)]\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000015021015147232357020177 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:09:31Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-77cd4d9559 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:09:41Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-77cd4d9559-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:13:06Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-77cd4d9559-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:13:07Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-77cd4d9559-8l7xv","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:23Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.5/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:23Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:31Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:31Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" in 405ms (405ms including waiting). Image size: 506291135 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:45Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:45Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:45Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-77cd4d9559-8l7xv_c3598bc0-17d3-47bb-935b-8e8b0fd1d20e became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:45Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:53Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-77cd4d9559-8l7xv_385e9f59-f8d2-4295-9998-6621c6a8dd53 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:53Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:53Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:53Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:56Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:56Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:57Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:58Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:14:59Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:00Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:04Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:05Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:05Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:05Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:06Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:15:08Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:18:46Z","reason":"InstallerPodFailed","message":"installer errors: installer: s: ([]string) (len=1 cap=1) {\n (string) (len=31) \"localhost-recovery-client-token\"\n },\n OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"serving-cert\"\n },\n ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\n (string) (len=18) \"kube-scheduler-pod\",\n (string) (len=6) \"config\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=20) \"scheduler-kubeconfig\",\n (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=16) \"policy-configmap\"\n },\n CertSecretNames: ([]string) (len=1 cap=1) {\n (string) (len=30) \"kube-scheduler-client-cert-key\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\nI0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0224 05:15:12.083331 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0224 05:15:12.083349 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\nF0224 05:15:56.100613 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:18:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"configmap/serviceaccount-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:18:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"configmap/serviceaccount-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\" to \"NodeControllerDegraded: All master nodes are ready\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-client-crb.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\\nKubeControllerManagerStaticResourcesDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/serviceaccount-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:18:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-client-crb.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\\nKubeControllerManagerStaticResourcesDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/serviceaccount-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=31) \\\"localhost-recovery-client-token\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=12) \\\"serving-cert\\\"\\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\\nNodeInstallerDegraded: (string) (len=18) \\\"kube-scheduler-pod\\\",\\nNodeInstallerDegraded: (string) (len=6) \\\"config\\\",\\nNodeInstallerDegraded: (string) (len=17) \\\"serviceaccount-ca\\\",\\nNodeInstallerDegraded: (string) (len=20) \\\"scheduler-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=37) \\\"kube-scheduler-cert-syncer-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=16) \\\"policy-configmap\\\"\\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=30) \\\"kube-scheduler-client-cert-key\\\"\\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-client-crb.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\\nKubeControllerManagerStaticResourcesDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/serviceaccount-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:18:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=31) \\\"localhost-recovery-client-token\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=12) \\\"serving-cert\\\"\\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\\nNodeInstallerDegraded: (string) (len=18) \\\"kube-scheduler-pod\\\",\\nNodeInstallerDegraded: (string) (len=6) \\\"config\\\",\\nNodeInstallerDegraded: (string) (len=17) \\\"serviceaccount-ca\\\",\\nNodeInstallerDegraded: (string) (len=20) \\\"scheduler-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=37) \\\"kube-scheduler-cert-syncer-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=16) \\\"policy-configmap\\\"\\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=30) \\\"kube-scheduler-client-cert-key\\\"\\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-client-crb.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\\nKubeControllerManagerStaticResourcesDegraded: \\nTargetConfigControllerDegraded: \\\"configmap/serviceaccount-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps serviceaccount-ca)\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=31) \\\"localhost-recovery-client-token\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=12) \\\"serving-cert\\\"\\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\\nNodeInstallerDegraded: (string) (len=18) \\\"kube-scheduler-pod\\\",\\nNodeInstallerDegraded: (string) (len=6) \\\"config\\\",\\nNodeInstallerDegraded: (string) (len=17) \\\"serviceaccount-ca\\\",\\nNodeInstallerDegraded: (string) (len=20) \\\"scheduler-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=37) \\\"kube-scheduler-cert-syncer-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=16) \\\"policy-configmap\\\"\\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=30) \\\"kube-scheduler-client-cert-key\\\"\\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-client-crb.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\\nKubeControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:18:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=31) \\\"localhost-recovery-client-token\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=12) \\\"serving-cert\\\"\\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\\nNodeInstallerDegraded: (string) (len=18) \\\"kube-scheduler-pod\\\",\\nNodeInstallerDegraded: (string) (len=6) \\\"config\\\",\\nNodeInstallerDegraded: (string) (len=17) \\\"serviceaccount-ca\\\",\\nNodeInstallerDegraded: (string) (len=20) \\\"scheduler-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=37) \\\"kube-scheduler-cert-syncer-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=16) \\\"policy-configmap\\\"\\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=30) \\\"kube-scheduler-client-cert-key\\\"\\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts openshift-kube-scheduler-sa)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-client-crb.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:operator:kube-scheduler-recovery)\\nKubeControllerManagerStaticResourcesDegraded: \\\"assets/kube-scheduler/localhost-recovery-sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts localhost-recovery-client)\\nKubeControllerManagerStaticResourcesDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=31) \\\"localhost-recovery-client-token\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=12) \\\"serving-cert\\\"\\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\\nNodeInstallerDegraded: (string) (len=18) \\\"kube-scheduler-pod\\\",\\nNodeInstallerDegraded: (string) (len=6) \\\"config\\\",\\nNodeInstallerDegraded: (string) (len=17) \\\"serviceaccount-ca\\\",\\nNodeInstallerDegraded: (string) (len=20) \\\"scheduler-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=37) \\\"kube-scheduler-cert-syncer-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=16) \\\"policy-configmap\\\"\\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=30) \\\"kube-scheduler-client-cert-key\\\"\\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-24T05:19:01Z","reason":"PodCreated","message":"Created Pod/installer-1-retry-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000305115147232357016346 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-24T05:15:10Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.36/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-24T05:15:10Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-24T05:15:11Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-24T05:15:11Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-24T05:19:01Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-24T05:19:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-24T05:19:02Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-24T05:19:02Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000012531515147232357022024 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:09:33Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-7bcfbc574b to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:09:44Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-7bcfbc574b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:13:07Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-7bcfbc574b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:13:09Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-7bcfbc574b-8zrj9","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.11/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:35Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\" in 4.551s (4.551s including waiting). Image size: 508786786 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"LeaderElection","message":"kube-controller-manager-operator-7bcfbc574b-8zrj9_586bc55f-4b79-49cc-a047-f3b2b0aaf7c5 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-qdhhk\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:39Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:40Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:40Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:40Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:41Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:41Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:42Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-qdhhk\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:50Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:53Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:14:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:00Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:05Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:07Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:08Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:08Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:08Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:09Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:10Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:10Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:10Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:11Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:14Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:16Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:22Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:22Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:24Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:25Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:28Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:15:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:18:41Z","reason":"BackOff","message":"Back-off restarting failed container kube-controller-manager-operator in pod kube-controller-manager-operator-7bcfbc574b-8zrj9_openshift-kube-controller-manager-operator(22813c83-2f60-44ad-9624-ad367cec08f7)","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:18:54Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:18:54Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-24T05:18:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\" already present on machine","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000174315147232357020171 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-24T05:15:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.39/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-24T05:15:28Z","reason":"Killing","message":"Stopping container installer","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215147232357016371 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-24T05:15:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.40/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000017251715147232357020237 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:09:48Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-5d87bf58c to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:09:49Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-5d87bf58c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:13:07Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-5d87bf58c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:13:09Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-5d87bf58c-ncrqj","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.21/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"LeaderElection","message":"kube-apiserver-operator-5d87bf58c-ncrqj_9d686ab9-30d4-4e44-8562-31f3ba898aa0 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:25Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:25Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:25Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:25Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:26Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:26Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:26Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:26Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:26Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:26Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:27Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:27Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:27Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:27Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:27Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:28Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:28Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:28Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:28Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:29Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:29Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:29Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:30Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:30Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:30Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:31Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:31Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:31Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:31Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:32Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:32Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:32Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:32Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:32Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:33Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:33Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:33Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:34Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:34Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:35Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:35Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:35Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:35Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:35Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:38Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:38Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:38Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:38Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:38Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:38Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:38Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:39Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:39Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:39Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:40Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:40Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:40Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:41Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:41Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:45Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:54Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:14:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:00Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:02Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:02Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:04Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:04Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:05Z","reason":"SecretCreated","message":"Created Secret/webhook-authenticator -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:07Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:07Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:08Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"optional secret/webhook-authenticator has been created\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:12Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:12Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:14Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n  \t\"admission\": map[string]any{\"pluginConfig\": map[string]any{\"PodSecurity\": map[string]any{\"configuration\": map[string]any{\"defaults\": map[string]any{\"audit\": string(\"restricted\"), \"audit-version\": string(\"latest\"), \"enforce\": string(\"privileged\"), \"enforce-version\": string(\"latest\"), ...}}}, \"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{\"allowIngressIP\": bool(false), \"apiVersion\": string(\"network.openshift.io/v1\"), \"kind\": string(\"ExternalIPRangerAdmissionConfig\")}}, \"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{\"apiVersion\": string(\"network.openshift.io/v1\"), \"kind\": string(\"RestrictedEndpointsAdmissionConfig\"), \"restrictedCIDRs\": []any{string(\"10.128.0.0/16\"), string(\"172.30.0.0/16\")}}}}},\n  \t\"apiServerArguments\": map[string]any{\n  \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"authentication-token-webhook-config-file\": []any{\n+ \t\t\tstring(\"/etc/kubernetes/static-pod-resources/secrets/webhook-authenticator/kubeConfig\"),\n+ \t\t},\n+ \t\t\"authentication-token-webhook-version\": []any{string(\"v1\")},\n  \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n  \t\t\"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n  \t\t... // 6 identical entries\n  \t},\n  \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n  \t\"gracefulTerminationDuration\": string(\"15\"),\n  \t... // 2 identical entries\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:14Z","reason":"ObserveWebhookTokenAuthenticator","message":"authentication-token webhook configuration status changed from false to true","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:17Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:22Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-apiserver:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:23Z","reason":"SecretCreated","message":"Created Secret/etcd-client-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:27Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:15:28Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:18:41Z","reason":"BackOff","message":"Back-off restarting failed container kube-apiserver-operator in pod kube-apiserver-operator-5d87bf58c-ncrqj_openshift-kube-apiserver-operator(17f8e10b-88dc-4158-a7c4-aaa2f5d5fb9d)","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:18:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:18:52Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-24T05:18:52Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001215415147232357014367 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:14:58Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:14:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.31/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:14:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:14:58Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:15:29Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:15:43Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:15:43Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:15:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:15:57Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:15:57Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:16:10Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:16:11Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:16:11Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:56Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:56Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:56Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:56Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:57Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:57Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:57Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:57Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:57Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-24T05:17:57Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000003473415147232357016230 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:09:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-545bf96f4d to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:09:46Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-545bf96f4d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:13:07Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-545bf96f4d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:13:09Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-545bf96f4d-tfmbs","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:23Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:23Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:35Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" in 4.852s (4.852s including waiting). Image size: 518279996 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"LeaderElection","message":"etcd-operator-545bf96f4d-tfmbs_b231cddb-0896-4943-849a-a0549b114902 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nNodeControllerDegraded: All master nodes are ready\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:37Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:39Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:39Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:39Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:39Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:40Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:41Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:41Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:42Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:43Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:14:50Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:17:35Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:17:35Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:17:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:17:43Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-24T05:17:43Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000410615147232357016564 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-24T05:15:12Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6f8b7f45f7-5df4m","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-24T05:15:12Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6f8b7f45f7 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-24T05:15:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-24T05:15:18Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-24T05:15:21Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\" in 3.405s (3.405s including waiting). Image size: 505244089 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-24T05:15:22Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-24T05:15:22Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-24T05:15:23Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-24T05:15:23Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-24T05:15:23Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000056015147232357015120 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-02-24T05:14:54Z","reason":"SuccessfulCreate","message":"Created pod: router-default-7b65dc9fcb-zxkt2","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-24T05:14:54Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-7b65dc9fcb to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000020131115147232357020313 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:09:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-5bd7c86784 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:09:45Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5bd7c86784-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:13:06Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5bd7c86784-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:13:08Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-5bd7c86784-kbb8z","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:33Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:33Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:44Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\" in 404ms (404ms including waiting). Image size: 513119434 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:45Z","reason":"LeaderElection","message":"authentication-operator-5bd7c86784-kbb8z_fc1f20a4-a077-491f-b58a-115d534fe158 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:47Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:48Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:49Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:50Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:50Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-7bfhf\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:50Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-7bfhf\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:51Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:52Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:52Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:54Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:55Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:56Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:56Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:58Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:14:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:02Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:02Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:02Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:02Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:04Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:04Z","reason":"SecretCreated","message":"Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:04Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:05Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:06Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:07Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:11Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:11Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:11Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:12Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:15:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:18:29Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:18:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:18:42Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:18:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\",status.versions changed from [{\"operator\" \"4.18.33\"}] to [{\"operator\" \"4.18.33\"} {\"oauth-apiserver\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:18:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/serviceaccount.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/oauth-service.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services oauth-openshift)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/trust_distribution_role.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:oauth-servercert-trust)\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-24T05:18:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/serviceaccount.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/oauth-service.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services oauth-openshift)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/trust_distribution_role.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:oauth-servercert-trust)\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.239.24:443/healthz\\\": dial tcp 172.30.239.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015147232357016301 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-24T05:14:55Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-24T05:14:55Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003477315147232344014623 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":338,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-os-puller","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015147232343014077 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000004514415147232330014541 0ustar0000000000000000Feb 24 05:17:56.236365 master-0 kubenswrapper[7614]: E0224 05:17:56.236210 7614 kubelet.go:1929] "Failed creating a mirror pod for" err="Internal error occurred: admission plugin \"LimitRanger\" failed to complete mutation in 13s" pod="openshift-etcd/etcd-master-0" Feb 24 05:18:00.376100 master-0 kubenswrapper[7614]: E0224 05:18:00.375917 7614 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="7s" Feb 24 05:18:01.365298 master-0 kubenswrapper[7614]: E0224 05:18:01.365191 7614 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 24 05:18:04.857582 master-0 kubenswrapper[7614]: I0224 05:18:04.857275 7614 patch_prober.go:28] interesting pod/catalogd-controller-manager-84b8d9d697-zvzxs container/manager namespace/openshift-catalogd: Readiness probe status=failure output="Get \"http://10.128.0.28:8081/readyz\": dial tcp 10.128.0.28:8081: connect: connection refused" start-of-body= Feb 24 05:18:04.857582 master-0 kubenswrapper[7614]: I0224 05:18:04.857485 7614 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-catalogd/catalogd-controller-manager-84b8d9d697-zvzxs" podUID="d9492fbf-d0f4-4ecf-84ba-b089d69535c1" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.28:8081/readyz\": dial tcp 10.128.0.28:8081: connect: connection refused" Feb 24 05:18:05.311161 master-0 kubenswrapper[7614]: I0224 05:18:05.311073 7614 patch_prober.go:28] interesting pod/operator-controller-controller-manager-9cc7d7bb-t75jj container/manager namespace/openshift-operator-controller: Readiness probe status=failure output="Get \"http://10.128.0.26:8081/readyz\": dial tcp 10.128.0.26:8081: connect: connection refused" start-of-body= Feb 24 05:18:05.311579 master-0 kubenswrapper[7614]: I0224 05:18:05.311185 7614 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-t75jj" podUID="347c43e5-86d5-436f-bdc5-1c7bbe19ab2a" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.26:8081/readyz\": dial tcp 10.128.0.26:8081: connect: connection refused" Feb 24 05:18:11.216729 master-0 kubenswrapper[7614]: I0224 05:18:11.216622 7614 patch_prober.go:28] interesting pod/controller-manager-557cb6655b-75nhl container/controller-manager namespace/openshift-controller-manager: Liveness probe status=failure output="Get \"https://10.128.0.42:8443/healthz\": dial tcp 10.128.0.42:8443: connect: connection refused" start-of-body= Feb 24 05:18:11.217502 master-0 kubenswrapper[7614]: I0224 05:18:11.216740 7614 patch_prober.go:28] interesting pod/controller-manager-557cb6655b-75nhl container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.42:8443/healthz\": dial tcp 10.128.0.42:8443: connect: connection refused" start-of-body= Feb 24 05:18:11.217502 master-0 kubenswrapper[7614]: I0224 05:18:11.216742 7614 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-controller-manager/controller-manager-557cb6655b-75nhl" podUID="e75c6622-29b4-4da8-8409-be898aab9f49" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.42:8443/healthz\": dial tcp 10.128.0.42:8443: connect: connection refused" Feb 24 05:18:11.217502 master-0 kubenswrapper[7614]: I0224 05:18:11.216880 7614 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-557cb6655b-75nhl" podUID="e75c6622-29b4-4da8-8409-be898aab9f49" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.42:8443/healthz\": dial tcp 10.128.0.42:8443: connect: connection refused" Feb 24 05:18:11.365627 master-0 kubenswrapper[7614]: E0224 05:18:11.365518 7614 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 24 05:18:14.857470 master-0 kubenswrapper[7614]: I0224 05:18:14.857276 7614 patch_prober.go:28] interesting pod/catalogd-controller-manager-84b8d9d697-zvzxs container/manager namespace/openshift-catalogd: Liveness probe status=failure output="Get \"http://10.128.0.28:8081/healthz\": dial tcp 10.128.0.28:8081: connect: connection refused" start-of-body= Feb 24 05:18:14.858560 master-0 kubenswrapper[7614]: I0224 05:18:14.857458 7614 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-catalogd/catalogd-controller-manager-84b8d9d697-zvzxs" podUID="d9492fbf-d0f4-4ecf-84ba-b089d69535c1" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.28:8081/healthz\": dial tcp 10.128.0.28:8081: connect: connection refused" Feb 24 05:18:14.858560 master-0 kubenswrapper[7614]: I0224 05:18:14.857293 7614 patch_prober.go:28] interesting pod/catalogd-controller-manager-84b8d9d697-zvzxs container/manager namespace/openshift-catalogd: Readiness probe status=failure output="Get \"http://10.128.0.28:8081/readyz\": dial tcp 10.128.0.28:8081: connect: connection refused" start-of-body= Feb 24 05:18:14.858560 master-0 kubenswrapper[7614]: I0224 05:18:14.857698 7614 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-catalogd/catalogd-controller-manager-84b8d9d697-zvzxs" podUID="d9492fbf-d0f4-4ecf-84ba-b089d69535c1" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.28:8081/readyz\": dial tcp 10.128.0.28:8081: connect: connection refused" Feb 24 05:18:15.310584 master-0 kubenswrapper[7614]: I0224 05:18:15.310476 7614 patch_prober.go:28] interesting pod/operator-controller-controller-manager-9cc7d7bb-t75jj container/manager namespace/openshift-operator-controller: Liveness probe status=failure output="Get \"http://10.128.0.26:8081/healthz\": dial tcp 10.128.0.26:8081: connect: connection refused" start-of-body= Feb 24 05:18:15.310872 master-0 kubenswrapper[7614]: I0224 05:18:15.310598 7614 patch_prober.go:28] interesting pod/operator-controller-controller-manager-9cc7d7bb-t75jj container/manager namespace/openshift-operator-controller: Readiness probe status=failure output="Get \"http://10.128.0.26:8081/readyz\": dial tcp 10.128.0.26:8081: connect: connection refused" start-of-body= Feb 24 05:18:15.310872 master-0 kubenswrapper[7614]: I0224 05:18:15.310620 7614 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-t75jj" podUID="347c43e5-86d5-436f-bdc5-1c7bbe19ab2a" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.26:8081/healthz\": dial tcp 10.128.0.26:8081: connect: connection refused" Feb 24 05:18:15.310872 master-0 kubenswrapper[7614]: I0224 05:18:15.310699 7614 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-t75jj" podUID="347c43e5-86d5-436f-bdc5-1c7bbe19ab2a" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.26:8081/readyz\": dial tcp 10.128.0.26:8081: connect: connection refused" Feb 24 05:18:17.240134 master-0 kubenswrapper[7614]: E0224 05:18:17.240049 7614 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Feb 24 05:18:17.241489 master-0 kubenswrapper[7614]: E0224 05:18:17.240364 7614 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.013s" Feb 24 05:18:17.377713 master-0 kubenswrapper[7614]: E0224 05:18:17.377568 7614 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="7s" Feb 24 05:18:19.994153 master-0 kubenswrapper[7614]: E0224 05:18:19.993943 7614 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{etcd-master-0.189716e31a39b050 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:etcd-master-0,UID:18a83278819db2092fa26d8274eb3f00,APIVersion:v1,ResourceVersion:,FieldPath:spec.initContainers{setup},},Reason:Pulled,Message:Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-02-24 05:15:43.046955088 +0000 UTC m=+74.081698284,LastTimestamp:2026-02-24 05:15:43.046955088 +0000 UTC m=+74.081698284,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Feb 24 05:18:21.216168 master-0 kubenswrapper[7614]: I0224 05:18:21.216084 7614 patch_prober.go:28] interesting pod/controller-manager-557cb6655b-75nhl container/controller-manager namespace/openshift-controller-manager: Liveness probe status=failure output="Get \"https://10.128.0.42:8443/healthz\": dial tcp 10.128.0.42:8443: connect: connection refused" start-of-body= Feb 24 05:18:21.217004 master-0 kubenswrapper[7614]: I0224 05:18:21.216172 7614 patch_prober.go:28] interesting pod/controller-manager-557cb6655b-75nhl container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.42:8443/healthz\": dial tcp 10.128.0.42:8443: connect: connection refused" start-of-body= Feb 24 05:18:21.217004 master-0 kubenswrapper[7614]: I0224 05:18:21.216253 7614 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-557cb6655b-75nhl" podUID="e75c6622-29b4-4da8-8409-be898aab9f49" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.42:8443/healthz\": dial tcp 10.128.0.42:8443: connect: connection refused" Feb 24 05:18:21.217004 master-0 kubenswrapper[7614]: I0224 05:18:21.216171 7614 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-controller-manager/controller-manager-557cb6655b-75nhl" podUID="e75c6622-29b4-4da8-8409-be898aab9f49" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.42:8443/healthz\": dial tcp 10.128.0.42:8443: connect: connection refused" Feb 24 05:18:26.930130 master-0 kubenswrapper[7614]: E0224 05:18:26.930017 7614 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="9.689s" Feb 24 05:18:27.099296 master-0 kubenswrapper[7614]: E0224 05:18:27.099046 7614 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"7e457713ca1d1ba317f2afd7258df17db980e4c10d06e5baec4b31193663e429\": container with ID starting with 7e457713ca1d1ba317f2afd7258df17db980e4c10d06e5baec4b31193663e429 not found: ID does not exist" containerID="7e457713ca1d1ba317f2afd7258df17db980e4c10d06e5baec4b31193663e429" Feb 24 05:18:27.099640 master-0 kubenswrapper[7614]: E0224 05:18:27.099589 7614 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"487b980bd30f01a4370e0f26f33ccb604a296e479126f79a526ff15ecc98aaf8\": container with ID starting with 487b980bd30f01a4370e0f26f33ccb604a296e479126f79a526ff15ecc98aaf8 not found: ID does not exist" containerID="487b980bd30f01a4370e0f26f33ccb604a296e479126f79a526ff15ecc98aaf8" Feb 24 05:18:34.378585 master-0 kubenswrapper[7614]: E0224 05:18:34.378410 7614 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="7s" Feb 24 05:18:36.018720 master-0 kubenswrapper[7614]: E0224 05:18:36.018636 7614 kubelet.go:1929] "Failed creating a mirror pod for" err="pods \"etcd-master-0\" already exists" pod="openshift-etcd/etcd-master-0" Feb 24 05:18:40.031295 master-0 kubenswrapper[7614]: E0224 05:18:40.031224 7614 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"network-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=network-operator pod=network-operator-7d7db75979-4fk6k_openshift-network-operator(f77227c8-c52d-4a71-ae1b-792055f6f23d)\"" pod="openshift-network-operator/network-operator-7d7db75979-4fk6k" podUID="f77227c8-c52d-4a71-ae1b-792055f6f23d" Feb 24 05:18:41.043286 master-0 kubenswrapper[7614]: E0224 05:18:41.043239 7614 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-apiserver-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=kube-apiserver-operator pod=kube-apiserver-operator-5d87bf58c-ncrqj_openshift-kube-apiserver-operator(17f8e10b-88dc-4158-a7c4-aaa2f5d5fb9d)\"" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-ncrqj" podUID="17f8e10b-88dc-4158-a7c4-aaa2f5d5fb9d" Feb 24 05:18:41.049523 master-0 kubenswrapper[7614]: E0224 05:18:41.049464 7614 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=kube-controller-manager-operator pod=kube-controller-manager-operator-7bcfbc574b-8zrj9_openshift-kube-controller-manager-operator(22813c83-2f60-44ad-9624-ad367cec08f7)\"" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-8zrj9" podUID="22813c83-2f60-44ad-9624-ad367cec08f7" Feb 24 05:18:41.057641 master-0 kubenswrapper[7614]: E0224 05:18:41.057555 7614 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-storage-version-migrator-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=kube-storage-version-migrator-operator pod=kube-storage-version-migrator-operator-fc889cfd5-r6p58_openshift-kube-storage-version-migrator-operator(c3fed34f-b275-42c6-af6c-8de3e6fe0f9e)\"" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-fc889cfd5-r6p58" podUID="c3fed34f-b275-42c6-af6c-8de3e6fe0f9e" Feb 24 05:19:01.026491 master-0 kubenswrapper[7614]: E0224 05:19:01.026063 7614 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="74d070e9-4193-4598-ad68-15955b07d649" containerName="installer" Feb 24 05:19:01.026491 master-0 kubenswrapper[7614]: E0224 05:19:01.026109 7614 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2d3d57f1-cd67-4f1d-b267-f652b9bb3448" containerName="installer" Feb 24 05:19:01.026491 master-0 kubenswrapper[7614]: E0224 05:19:01.026139 7614 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="1d886fdf-fd74-45de-b7c0-2e8e75eb994e" containerName="installer" Feb 24 05:19:01.026491 master-0 kubenswrapper[7614]: E0224 05:19:01.026174 7614 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e44f770d-f88d-446a-a22f-51b30e89690c" containerName="installer" Feb 24 05:19:02.267221 master-0 kubenswrapper[7614]: E0224 05:19:02.267166 7614 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"eb6669c66956cacb51b3a8c28637b0795fa1847baffcb87c1466213004c904a0\": container with ID starting with eb6669c66956cacb51b3a8c28637b0795fa1847baffcb87c1466213004c904a0 not found: ID does not exist" containerID="eb6669c66956cacb51b3a8c28637b0795fa1847baffcb87c1466213004c904a0" Feb 24 05:19:02.267865 master-0 kubenswrapper[7614]: E0224 05:19:02.267790 7614 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"caaa92858c7b0807c25410a67269dc27f4266cbb4b787010dfde00b1cfce4b7b\": container with ID starting with caaa92858c7b0807c25410a67269dc27f4266cbb4b787010dfde00b1cfce4b7b not found: ID does not exist" containerID="caaa92858c7b0807c25410a67269dc27f4266cbb4b787010dfde00b1cfce4b7b" Feb 24 05:19:02.320781 master-0 kubenswrapper[7614]: E0224 05:19:02.320426 7614 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"011d397235a77ecca99655074960637a0e06d4850a685cb71f22e206406b1d2d\": container with ID starting with 011d397235a77ecca99655074960637a0e06d4850a685cb71f22e206406b1d2d not found: ID does not exist" containerID="011d397235a77ecca99655074960637a0e06d4850a685cb71f22e206406b1d2d" Feb 24 05:19:02.321989 master-0 kubenswrapper[7614]: E0224 05:19:02.321834 7614 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"4ca5d250bec3b25175c35f6a821fe8e53e48f1d38446e2b1d4770a2ed43da0a2\": container with ID starting with 4ca5d250bec3b25175c35f6a821fe8e53e48f1d38446e2b1d4770a2ed43da0a2 not found: ID does not exist" containerID="4ca5d250bec3b25175c35f6a821fe8e53e48f1d38446e2b1d4770a2ed43da0a2" Feb 24 05:19:02.936557 master-0 kubenswrapper[7614]: E0224 05:19:02.936523 7614 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e75c6622-29b4-4da8-8409-be898aab9f49" containerName="controller-manager" Feb 24 05:19:02.936645 master-0 kubenswrapper[7614]: E0224 05:19:02.936612 7614 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="fe235661-d492-48fc-92e6-d9e1938daeb7" containerName="machine-approver-controller" Feb 24 05:19:02.936703 master-0 kubenswrapper[7614]: E0224 05:19:02.936650 7614 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="fe235661-d492-48fc-92e6-d9e1938daeb7" containerName="kube-rbac-proxy" Feb 24 05:19:02.936703 master-0 kubenswrapper[7614]: E0224 05:19:02.936686 7614 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="8cafd431-e8f6-4b60-9214-3d01b1f43982" containerName="route-controller-manager" Feb 24 05:19:02.937130 master-0 kubenswrapper[7614]: E0224 05:19:02.937054 7614 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e75c6622-29b4-4da8-8409-be898aab9f49" containerName="controller-manager"aggregated/ingress_controllers_certs.json0000640000000000000000000000045715147232330017533 0ustar0000000000000000[{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-02-24T05:14:54Z","not_after":"2028-02-24T05:14:55Z","controllers":[]},{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-02-24T05:14:53Z","not_after":"2028-02-24T05:14:54Z","controllers":[]}]aggregated/unused_machine_configs_count.json0000640000000000000000000000004115147232330020127 0ustar0000000000000000{"unused_machineconfigs_count":9}config/clusteroperator/storage.json0000640000000000000000000000131215147232330016276 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"db23e4a8-a70a-4794-a294-57f175068398","resourceVersion":"706","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315147232330016656 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"9ab97e23-0ca8-431f-a8db-477bafdb9389","resourceVersion":"4048","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:36Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:14:40Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:14:38Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:38Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-24T05:14:36Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000252415147232330024660 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"abbebbc5-ad83-4344-9605-03798d43a873","resourceVersion":"9253","generation":1,"creationTimestamp":"2026-02-24T05:09:19Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:19:04Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-24T05:19:04Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-24T05:19:04Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:19:04Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255415147232330023453 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"1fa29481-500c-46d6-9be5-9bdcc894fa32","resourceVersion":"9290","generation":1,"creationTimestamp":"2026-02-24T05:09:19Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:19:05Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-24T05:19:05Z","message":"Deployed 4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:19:05Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:19:05Z"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115147232330022040 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"366deed4-75b5-4398-8463-eb205852b8a2","resourceVersion":"9269","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:19:04Z","message":"Deployed 4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:19:04Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:19:04Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:19:04Z"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315147232330020302 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"186a3565-d462-43b5-af33-5e825c22ea88","resourceVersion":"789","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000346115147232330022431 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"59419c1b-a79a-4476-85e2-50cf3ad89422","resourceVersion":"9490","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:19:09Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:15:13Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-24T05:14:53Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215147232330020634 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"4f0d340e-89df-4e54-a943-31cd5aa99151","resourceVersion":"8698","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:48Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:15:24Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-24T05:14:48Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:47Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-24T05:14:47Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"openshift-apiserver","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415147232330015425 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"24cce3ab-f29f-4dfc-86bb-0bf47d63f056","resourceVersion":"8727","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:44Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:15:11Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:15:11Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:44Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-24T05:14:44Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115147232330017064 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"08798c25-f7c5-49dc-b6c9-46201dded85e","resourceVersion":"5581","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.33\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:14:56Z","reason":"AsExpected","message":"Cluster version is \"4.18.33\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:53Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.33"},{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614315147232330016335 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"4cb7ec4d-7637-4ca4-87e1-4c7781278e5e","resourceVersion":"6679","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-02-24T05:13:28Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:13:17Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:13:17Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:15:12Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:14:31Z"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715147232330017030 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"e789127d-86ee-4941-a9f0-75e151a1f50c","resourceVersion":"6548","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-02-24T05:15:10Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-02-24T05:15:10Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-24T05:15:10Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:15:10Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315147232330017125 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"c2879a4b-f8cb-486c-b031-a726666543ab","resourceVersion":"6598","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:15:11Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.33"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:15:11Z","reason":"OperatorAvailable","message":"Available release version: 4.18.33"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:15:11Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:15:11Z","reason":"OperatorAvailable","message":"Available release version: 4.18.33"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015147232330017477 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"2e7112f3-eaa9-4668-98be-92e87f3e629f","resourceVersion":"810","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215147232330020077 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"1d4fa73c-adcf-4e88-97ef-a2dcc732e028","resourceVersion":"8733","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:18:54Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.33"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:18:54Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:18:54Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:18:54Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371315147232330017014 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"0d60bc16-05e5-4d0d-9ec7-9da58a8b692d","resourceVersion":"9661","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:19:20Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:19:20Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:19:20Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:19:20Z"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315147232330022535 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"4f2e6013-4e8c-40a1-af6c-1b011792757a","resourceVersion":"4587","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:43Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:14:47Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:14:47Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:43Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-24T05:14:43Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000001204315147232330017537 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"e6a0e4db-e49a-4841-b79a-b0aebe050942","resourceVersion":"8690","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:46Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: s: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=31) \"localhost-recovery-client-token\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"serving-cert\"\nNodeInstallerDegraded: ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\nNodeInstallerDegraded: (string) (len=18) \"kube-scheduler-pod\",\nNodeInstallerDegraded: (string) (len=6) \"config\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=20) \"scheduler-kubeconfig\",\nNodeInstallerDegraded: (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=16) \"policy-configmap\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=30) \"kube-scheduler-client-cert-key\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0224 05:15:11.993986 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083227 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0224 05:15:12.083331 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.083349 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0224 05:15:12.095946 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0224 05:15:42.096030 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0224 05:15:56.100613 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: "},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-24T05:15:06Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-24T05:14:46Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:46Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715147232330021366 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"e614ce92-4e38-4a49-91b5-f9e2056c0822","resourceVersion":"8284","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:37Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-24T05:15:11Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-24T05:14:38Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:36Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-24T05:14:36Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715147232330017573 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"43e6c64e-0851-4fdb-b99c-07da5ae85225","resourceVersion":"6826","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:26Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-24T05:15:12Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-24T05:14:28Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:26Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-24T05:14:40Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415147232330016465 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"006e6df3-da5b-4344-a817-c10e16f63880","resourceVersion":"811","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000456715147232330016323 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"e8269f75-c3ab-43a0-b2cc-40fe1bb28bce","resourceVersion":"5451","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:14:55Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:55Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715147232330017570 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"4dec623f-a5da-40e7-a865-08cdd1b501e8","resourceVersion":"703","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015147232330015562 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"a58ac452-a6d9-4b14-bdb6-a3fdd36d214c","resourceVersion":"5079","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:36Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-24T05:14:53Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-24T05:14:36Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:36Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-24T05:14:36Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515147232330015432 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"0b787147-02c5-4ddc-9233-b991e103eb0a","resourceVersion":"6878","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:15:18Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:15:18Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:53Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715147232330021434 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"55779dd9-d8e1-4f4f-81bf-ddef3142e0ae","resourceVersion":"8642","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:14:58Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:14:58Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"csi-snapshot-controller","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515147232330021613 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"8f0cf365-afdc-41d8-b179-448b6b4cdbe9","resourceVersion":"8301","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:15:28Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:15:28Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:15:28Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:15:28Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215147232330016274 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"9779e3f4-1bb0-40b3-80ad-987ebccbf9ed","resourceVersion":"718","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000154215147232330017735 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"97beba3d-feea-4f6b-8197-712bc3f885ba","resourceVersion":"802","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000265715147232330020470 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"9e017481-3319-4b57-8563-615f768e85fb","resourceVersion":"9662","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:19:19Z","reason":"AsExpected","message":"at version 4.18.33"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:19:20Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:19:20Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:19:19Z"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000000346515147232330020063 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"98f3dbd3-5776-4256-9222-9532a308dd44","resourceVersion":"794","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"pod-identity-webhook"},{"group":"apps","resource":"deployments","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","name":""},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"","resource":"serviceaccounts","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"","resource":"services","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"pod-identity-webhook"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715147232330021544 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"22ee2910-d1a2-4b14-8dd2-0e13554eb285","resourceVersion":"814","generation":1,"creationTimestamp":"2026-02-24T05:09:17Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015147232330016574 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"dcea48a5-4a47-42b0-bdb5-4565ad0997f8","resourceVersion":"9553","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:19:19Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:19:19Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:19:19Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:19:19Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-24T05:19:19Z"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000771415147232330017665 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"d49dc044-160d-4e96-acd1-52e1d99b00b7","resourceVersion":"8684","generation":1,"creationTimestamp":"2026-02-24T05:09:18Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-24T05:18:19Z","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-24T05:18:42Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-24T05:14:46Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.239.24:443/healthz\": dial tcp 172.30.239.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-24T05:14:46Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-24T05:14:45Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"oauth-apiserver","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/running_containers.json0000640000000000000000000000720615147232330015312 0ustar0000000000000000{"images":{"0":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","1":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","10":"sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","11":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","12":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","13":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","14":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","15":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","16":"sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","17":"sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e","18":"sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de","19":"sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec","2":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","20":"sha256:034588ffd95ce834e866279bf80a45af2cddda631c6c9a6344c1bb2e033fd83e","21":"sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7","22":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","23":"sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74","24":"sha256:4797a485fd4ab3414ba8d52bdf2afccefab6c657b1d259baad703fca5145124c","25":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","26":"sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","27":"sha256:f86073cf0561e4b69668f8917ef5184cb0ef5aa16d0fefe38118f1167b268721","28":"sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","29":"sha256:16ea15164e7d71550d4c0e2c90d17f96edda4ab77123947b2e188ffb23951fa0","3":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","30":"sha256:f42321072d0ab781f41e8f595ed6f5efabe791e472c7d0784e61b3c214194656","31":"sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd","32":"sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","33":"sha256:ebf883de8fd905490f0c9b420a5d6446ecde18e12e15364f6dcd4e885104972c","34":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","35":"sha256:ce89154fa3fe1e87c660e644b58cf125fede575869fd5841600082c0d1f858a3","36":"sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6","37":"sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf","38":"sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655","39":"sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","4":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","40":"sha256:b1d840665bf310fa455ddaff9b262dd0649440ca9ecf34d49b340ce669885568","41":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","42":"sha256:2ba8aec9f09d75121b95d2e6f1097415302c0ae7121fa7076fd38d7adb9a5afa","5":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","6":"sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","7":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","8":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021","9":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2"},"containers":{"2026-02":{"0":11,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":1,"17":1,"18":1,"19":1,"2":6,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":4,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":3,"40":1,"41":1,"42":1,"5":3,"6":2,"7":2,"8":2,"9":2}}}config/pod/openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-t75jj.json0000640000000000000000000002473415147232330032255 0ustar0000000000000000{"metadata":{"name":"operator-controller-controller-manager-9cc7d7bb-t75jj","generateName":"operator-controller-controller-manager-9cc7d7bb-","namespace":"openshift-operator-controller","uid":"347c43e5-86d5-436f-bdc5-1c7bbe19ab2a","resourceVersion":"8422","creationTimestamp":"2026-02-24T05:14:54Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"9cc7d7bb"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.26/23\"],\"mac_address\":\"0a:58:0a:80:00:1a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.26/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.26\"\n ],\n \"mac\": \"0a:58:0a:80:00:1a\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-9cc7d7bb","uid":"379caff6-c30a-4d57-9b44-97318044a342","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-qgl4j","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-qgl4j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-qgl4j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:35Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:35Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.26","podIPs":[{"ip":"10.128.0.26"}],"startTime":"2026-02-24T05:14:54Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-24T05:14:56Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://2d045474bcc808e888ea99613b34e01a0a66e116cc0e638b11e46fe3a36672c9","started":true,"volumeMounts":[{"name":"kube-api-access-qgl4j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-24T05:18:17Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ork.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"c6b0cee3-fa43-497a-8e81-e4ecf236aa0d\"\nI0224 05:15:09.821005 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"c6b0cee3-fa43-497a-8e81-e4ecf236aa0d\"\nI0224 05:15:21.857715 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"40b8374b-5b59-4b50-987d-c232f403b26c\"\nI0224 05:15:22.548507 1 clustercatalog_controller.go:90] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"40b8374b-5b59-4b50-987d-c232f403b26c\"\nE0224 05:16:22.148946 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0224 05:17:22.152967 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0224 05:17:35.139733 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0224 05:17:35.139879 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-02-24T05:14:55Z","finishedAt":"2026-02-24T05:17:35Z","containerID":"cri-o://54f08b019978c50707a9af7625f4b1969ac2f9de3d91bdb89125a98cc8b35f5f"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","containerID":"cri-o://27d3c979d980c52be573082c4d98e2b43efa2f5962b15df7eb3f072aaaaf8885","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-qgl4j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-7d7db75979-4fk6k.json0000640000000000000000000002325715147232330025311 0ustar0000000000000000{"metadata":{"name":"network-operator-7d7db75979-4fk6k","generateName":"network-operator-7d7db75979-","namespace":"openshift-network-operator","uid":"f77227c8-c52d-4a71-ae1b-792055f6f23d","resourceVersion":"8735","creationTimestamp":"2026-02-24T05:13:08Z","labels":{"name":"network-operator","pod-template-hash":"7d7db75979"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7d7db75979","uid":"e2eb3ed0-323b-414d-8390-3141ed3a5bef","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-dcj62","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a35674598116548a5ce2f581acac033b76f22fa1b8522cc81b90e27feda33ed3"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b1d840665bf310fa455ddaff9b262dd0649440ca9ecf34d49b340ce669885568"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:16ea15164e7d71550d4c0e2c90d17f96edda4ab77123947b2e188ffb23951fa0"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4152cebea96e2b9a15cdc77a9c318b7af0db9ea1352619dac282e167e6e0d71b"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6fcab14d8cbcfb642ae6cc0d581cb152e45f39cf75c303ba7760fd448dfa2b2b"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0db75a631b1a51f2e6aa1cbf62770f4bd7604965ab1ddaddb07d18eb324d0acf"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dbffd1dbbfea8326edd5142aaed93290359c152c805239f2ffc77a21b6648490"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-dcj62","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:13:16Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:13:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:54Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:54Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:13:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-24T05:13:10Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-02-24T05:18:53Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0224 05:17:09.613439 1 cmd.go:250] Using service-serving-cert provided certificates\nI0224 05:17:09.613595 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0224 05:17:09.614060 1 observer_polling.go:159] Starting file observer\nW0224 05:18:09.623519 1 builder.go:266] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods network-operator-7d7db75979-4fk6k)\nI0224 05:18:09.623745 1 builder.go:298] network-operator version 4.18.0-202601302238.p2.gf63a7ff.assembly.stream.el9-f63a7ff-f63a7ffb316c9ca4359210ff5ea2c003dbe2d6a9\nF0224 05:18:39.887081 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-operator/leases/network-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-24T05:17:09Z","finishedAt":"2026-02-24T05:18:39Z","containerID":"cri-o://6e3c93a1a355eeeb3f5cb2283a174709bfd59dc7e2e2f1d724c2278f1e630da9"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","containerID":"cri-o://77344984c3a22910313574fd5443c3f8c0826a85a9d2f12dd8592b5e925a1b84","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-dcj62","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-rlg4x.json0000640000000000000000000002464115147232330025732 0ustar0000000000000000{"metadata":{"name":"network-node-identity-rlg4x","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"c106275b-72b6-4877-95c3-830f93e35375","resourceVersion":"8379","creationTimestamp":"2026-02-24T05:13:47Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"5978f5f76","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"60f2a452-0af6-45e5-a8e1-9987422a1556","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-4p8zb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-4p8zb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-4p8zb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:02Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:13:47Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:26Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:26Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:13:47Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-24T05:13:47Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-02-24T05:17:09Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ct={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-7wrfp\"} reason=\"CSRApproved\"\nI0224 05:14:09.098584 1 approver.go:230] Finished syncing CSR csr-7wrfp for master-0 node in 8.399177ms\nI0224 05:14:09.098956 1 approver.go:230] Finished syncing CSR csr-7wrfp for unknown node in 83.782µs\nI0224 05:14:09.111584 1 approver.go:230] Finished syncing CSR csr-7wrfp for unknown node in 67.282µs\nI0224 05:14:21.650130 1 recorder.go:104] \"CSR \\\"csr-2d6xw\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-2d6xw\"} reason=\"CSRApproved\"\nI0224 05:14:21.658733 1 approver.go:230] Finished syncing CSR csr-2d6xw for master-0 node in 9.121686ms\nI0224 05:14:21.658813 1 approver.go:230] Finished syncing CSR csr-2d6xw for unknown node in 38.281µs\nI0224 05:14:21.670400 1 approver.go:230] Finished syncing CSR csr-2d6xw for unknown node in 130.624µs\nE0224 05:15:57.402666 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded, falling back to slow path\nE0224 05:16:12.401785 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0224 05:16:12.401867 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0224 05:16:27.402558 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0224 05:16:27.402748 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-02-24T05:14:01Z","finishedAt":"2026-02-24T05:16:27Z","containerID":"cri-o://3c48cf95cb20519b43165b534538afb3afad0ec1beb464f9f497eefdb2dc3c0f"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","containerID":"cri-o://8d89f8110c46f839405874fb4dba9bf410e3a518ca5d273b143187f669975cd0","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-4p8zb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-02-24T05:14:01Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","containerID":"cri-o://3c6414107ba4e270b37d4ad16b7d423fe9bba347c1c7107a12ec4d69a07a7201","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-4p8zb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001513615147232330026257 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"9d188489-8dd1-4375-bd5b-6a7f964d9d7a","resourceVersion":"3585","creationTimestamp":"2026-02-24T05:13:16Z","annotations":{"kubernetes.io/config.hash":"c997c8e9d3be51d454d8e61e376bef08","kubernetes.io/config.mirror":"c997c8e9d3be51d454d8e61e376bef08","kubernetes.io/config.seen":"2026-02-24T05:12:33.963944843Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"22108df1-f7be-4c01-83d3-1c6b04e1f28e","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:29Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:29Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-24T05:14:29Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-24T05:12:37Z","finishedAt":"2026-02-24T05:12:37Z","containerID":"cri-o://23d5e42153d1239bec04afab6c545620b9ef683ee911bb6159c7f6877a1bbf3e"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://23d5e42153d1239bec04afab6c545620b9ef683ee911bb6159c7f6877a1bbf3e","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-02-24T05:13:16Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0224 05:12:52.562265 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0224 05:12:52.562450 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0224 05:12:52.563619 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-02-24T05:12:52Z","finishedAt":"2026-02-24T05:12:52Z","containerID":"cri-o://3e6942d2ca28138c7420b132dcdbb1b9a811151a995bdac20311a616719b966c"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://c041af7c63d223942ce08c38d39df788b42cf76c6700a1fcbc754b1fc0059d6c","started":true}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/control-plane-machine-set-operator-686847ff5f-zzvtt.json0000640000000000000000000001775215147232330027701 0ustar0000000000000000{"metadata":{"name":"control-plane-machine-set-operator-686847ff5f-zzvtt","generateName":"control-plane-machine-set-operator-686847ff5f-","namespace":"openshift-machine-api","uid":"32fd577d-8966-4ab1-95cf-357291084156","resourceVersion":"8382","creationTimestamp":"2026-02-24T05:15:23Z","labels":{"k8s-app":"control-plane-machine-set-operator","pod-template-hash":"686847ff5f"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.43/23\"],\"mac_address\":\"0a:58:0a:80:00:2b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.43/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.43\"\n ],\n \"mac\": \"0a:58:0a:80:00:2b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"control-plane-machine-set-operator-686847ff5f","uid":"c32a2f4f-6615-4101-a364-c49df70a2360","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"control-plane-machine-set-operator-tls","secret":{"secretName":"control-plane-machine-set-operator-tls","defaultMode":420}},{"name":"kube-api-access-fh2pc","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"control-plane-machine-set-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","command":["/manager"],"args":["-v=2","--leader-elect=true","--leader-elect-lease-duration=137s","--leader-elect-renew-deadline=107s","--leader-elect-retry-period=26s","--leader-elect-resource-namespace=openshift-machine-api"],"ports":[{"name":"https","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"control-plane-machine-set-operator-tls","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-fh2pc","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000500000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"control-plane-machine-set-operator","serviceAccount":"control-plane-machine-set-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c19"},"fsGroup":1000500000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"control-plane-machine-set-operator-dockercfg-kf8b6"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.43","podIPs":[{"ip":"10.128.0.43"}],"startTime":"2026-02-24T05:15:23Z","containerStatuses":[{"name":"control-plane-machine-set-operator","state":{"running":{"startedAt":"2026-02-24T05:18:27Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ble\" controller=\"controlplanemachineset\" reconcileID=\"0700c294-258f-4b15-a950-16b507f3e78d\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0224 05:15:28.853361 1 controller.go:184] \"Finished reconciling control plane machine set\" controller=\"controlplanemachineset\" reconcileID=\"0700c294-258f-4b15-a950-16b507f3e78d\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0224 05:15:28.853460 1 controller.go:170] \"Reconciling control plane machine set\" controller=\"controlplanemachineset\" reconcileID=\"ecadd08d-5e63-42b4-a2a8-69e26ec98308\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0224 05:15:28.853514 1 controller.go:178] \"No control plane machine set found, setting operator status available\" controller=\"controlplanemachineset\" reconcileID=\"ecadd08d-5e63-42b4-a2a8-69e26ec98308\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0224 05:15:28.853573 1 controller.go:184] \"Finished reconciling control plane machine set\" controller=\"controlplanemachineset\" reconcileID=\"ecadd08d-5e63-42b4-a2a8-69e26ec98308\" namespace=\"openshift-machine-api\" name=\"cluster\"\nE0224 05:16:28.739041 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0224 05:17:28.742792 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/control-plane-machine-set-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io control-plane-machine-set-leader)\nI0224 05:17:41.733100 1 leaderelection.go:297] failed to renew lease openshift-machine-api/control-plane-machine-set-leader: timed out waiting for the condition\nE0224 05:18:15.741067 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nE0224 05:18:15.741205 1 main.go:233] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-02-24T05:15:28Z","finishedAt":"2026-02-24T05:18:15Z","containerID":"cri-o://cd2e094a618f188c882e23ef5f50ea70a38793ab6e08f1bfec1cd4a082e97144"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","containerID":"cri-o://b931c4e73120acfd5edaa21c3bd09b78ab41757182041f2c3263ed0153cf894b","started":true,"volumeMounts":[{"name":"control-plane-machine-set-operator-tls","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-fh2pc","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-storage-version-migrator-operator-fc889cfd5-r6p58.json0000640000000000000000000001631215147232330035642 0ustar0000000000000000config/pod/openshift-kube-storage-version-migrator-operator{"metadata":{"name":"kube-storage-version-migrator-operator-fc889cfd5-r6p58","generateName":"kube-storage-version-migrator-operator-fc889cfd5-","namespace":"openshift-kube-storage-version-migrator-operator","uid":"c3fed34f-b275-42c6-af6c-8de3e6fe0f9e","resourceVersion":"8762","creationTimestamp":"2026-02-24T05:13:09Z","labels":{"app":"kube-storage-version-migrator-operator","pod-template-hash":"fc889cfd5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-storage-version-migrator-operator-fc889cfd5","uid":"7d5837ae-00aa-4ac0-91a5-30e664ea8333","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"kube-api-access-tlwzq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-storage-version-migrator-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc","command":["cluster-kube-storage-version-migrator-operator","start"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.33"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-tlwzq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1001,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-storage-version-migrator-operator","serviceAccount":"kube-storage-version-migrator-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c19,c14"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:55Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:55Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2026-02-24T05:14:23Z","containerStatuses":[{"name":"kube-storage-version-migrator-operator","state":{"running":{"startedAt":"2026-02-24T05:18:54Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0224 05:17:09.598070 1 cmd.go:253] Using service-serving-cert provided certificates\nI0224 05:17:09.598274 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0224 05:17:09.601862 1 observer_polling.go:159] Starting file observer\nW0224 05:18:09.610496 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0224 05:18:09.610762 1 builder.go:304] openshift-kube-storage-version-migrator-operator version 4.18.0-202601302238.p2.g59ba356.assembly.stream.el9-59ba356-59ba356f50ea3128905ffdb7137f868aa0588bab\nF0224 05:18:40.262491 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-storage-version-migrator-operator/leases/openshift-kube-storage-version-migrator-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-24T05:17:09Z","finishedAt":"2026-02-24T05:18:40Z","containerID":"cri-o://49b21c85c511839ea61bf1eb992b507dfd3ec3bd10df341c02909db55b0a753b"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc","containerID":"cri-o://8eadd02a3eb053b6fcdd393a3aeb7df438083855b4ae5ac3cfedf974ce5cb69c","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-tlwzq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-6569778c84-rr8r7.json0000640000000000000000000002443215147232330025150 0ustar0000000000000000{"metadata":{"name":"ingress-operator-6569778c84-rr8r7","generateName":"ingress-operator-6569778c84-","namespace":"openshift-ingress-operator","uid":"3d6b1ce7-1213-494c-829d-186d39eac7eb","resourceVersion":"8372","creationTimestamp":"2026-02-24T05:13:09Z","labels":{"name":"ingress-operator","pod-template-hash":"6569778c84"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-6569778c84","uid":"fd78762f-0b85-44e5-a8ff-89ec81a2c51e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-5q2r9","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-5q2r9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-5q2r9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:53Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:26Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:26Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2026-02-24T05:14:23Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-02-24T05:17:09Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"or.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"dns_controller\"}\n2026-02-24T05:16:53.931Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tShutdown signal received, waiting for all workers to finish\t{\"controller\": \"clientca_configmap_controller\"}\n2026-02-24T05:16:53.931Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"gatewayapi_controller\"}\n2026-02-24T05:16:53.931Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"clientca_configmap_controller\"}\n2026-02-24T05:16:53.931Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tShutdown signal received, waiting for all workers to finish\t{\"controller\": \"gatewayapi_upgradeable_controller\"}\n2026-02-24T05:16:53.931Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"gatewayapi_upgradeable_controller\"}\n2026-02-24T05:16:53.931Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tShutdown signal received, waiting for all workers to finish\t{\"controller\": \"crl\"}\n2026-02-24T05:16:53.931Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"crl\"}\n2026-02-24T05:16:53.931Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for caches\n2026-02-24T05:16:53.931Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2026-02-24T05:16:53.932Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\n2026-02-24T05:16:53.932Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-02-24T05:16:53.932Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-02-24T05:16:53.932Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n2026-02-24T05:16:53.932Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2026-02-24T05:14:53Z","finishedAt":"2026-02-24T05:16:54Z","containerID":"cri-o://dd6d3f4e8c90f9e72cf283fa2ee57699a971df08e7b5a82fbc21deb33aca4d26"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","containerID":"cri-o://f9e75ea6f0c81eec46e337376adf731ab535fc067c7d1c6d227f14a9e7433ffe","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-5q2r9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-24T05:14:53Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://3a3e30c4351711cf4f4182871c1ce5a932bdfff6eaed56b06c55a876d10de8a1","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-5q2r9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-6847bb4785-vqn96.json0000640000000000000000000001670215147232330030160 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-6847bb4785-vqn96","generateName":"csi-snapshot-controller-6847bb4785-","namespace":"openshift-cluster-storage-operator","uid":"b79ef90c-dc66-4d5f-8943-2c3ac68796ba","resourceVersion":"8385","creationTimestamp":"2026-02-24T05:14:54Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"6847bb4785"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.27/23\"],\"mac_address\":\"0a:58:0a:80:00:1b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.27/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.27\"\n ],\n \"mac\": \"0a:58:0a:80:00:1b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-6847bb4785","uid":"eb171a21-3c10-47fc-88f6-cc47473d6821","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-zb4rw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-zb4rw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000150000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsNonRoot":true,"fsGroup":1000150000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:27Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:27Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.27","podIPs":[{"ip":"10.128.0.27"}],"startTime":"2026-02-24T05:14:54Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-02-24T05:18:27Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ler-leader\nI0224 05:14:58.541609 1 leader_election.go:184] \"became leader, starting\"\nI0224 05:14:58.544927 1 snapshot_controller_base.go:255] Starting snapshot controller\nI0224 05:14:58.544963 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0224 05:14:58.545009 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0224 05:14:58.548793 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotClass from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0224 05:14:58.548826 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotContent from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0224 05:14:58.548850 1 reflector.go:368] Caches populated for *v1.VolumeSnapshot from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI0224 05:14:58.549063 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160\nI0224 05:14:58.549254 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160\nE0224 05:16:24.577696 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0224 05:17:24.582764 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-storage-operator/snapshot-controller-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io snapshot-controller-leader)\nI0224 05:17:37.574707 1 leaderelection.go:297] failed to renew lease openshift-cluster-storage-operator/snapshot-controller-leader: timed out waiting for the condition\nE0224 05:17:37.574844 1 leader_election.go:188] \"Stopped leading\"\n","startedAt":"2026-02-24T05:14:58Z","finishedAt":"2026-02-24T05:17:37Z","containerID":"cri-o://92100dde9dbd51740744fac31aa4b79ba4dfcf0cd902c28d6ae66b9259196300"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","containerID":"cri-o://9223fb2da930fb3c50e82163a41bfe2c42eac1ee2e2d4f682d787074cbff45d5","started":true,"volumeMounts":[{"name":"kube-api-access-zb4rw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-84b8d9d697-zvzxs.json0000640000000000000000000002537715147232330026056 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-84b8d9d697-zvzxs","generateName":"catalogd-controller-manager-84b8d9d697-","namespace":"openshift-catalogd","uid":"d9492fbf-d0f4-4ecf-84ba-b089d69535c1","resourceVersion":"8419","creationTimestamp":"2026-02-24T05:14:54Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"84b8d9d697"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.28/23\"],\"mac_address\":\"0a:58:0a:80:00:1c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.28/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.28\"\n ],\n \"mac\": \"0a:58:0a:80:00:1c\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-84b8d9d697","uid":"e3ab6f6d-06f6-4c5e-8958-936d3fc1c9e4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-fzp4b","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-fzp4b","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-fzp4b","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:18:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:14:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.28","podIPs":[{"ip":"10.128.0.28"}],"startTime":"2026-02-24T05:14:54Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-24T05:14:55Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://9e2715addd0f34bc4408328c5d9cad44d2936e4baa20d1665cd908d3e434bdfd","started":true,"volumeMounts":[{"name":"kube-api-access-fzp4b","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-24T05:18:17Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"shift-redhat-operators\" reconcileID=\"e0a6b29c-f40a-4427-a24d-31f6b1047406\" layer=0\nI0224 05:17:01.176602 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"e0a6b29c-f40a-4427-a24d-31f6b1047406\" layer=1\nI0224 05:17:01.436407 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"e0a6b29c-f40a-4427-a24d-31f6b1047406\" layer=2\nI0224 05:17:04.178432 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"e0a6b29c-f40a-4427-a24d-31f6b1047406\" layer=3\nI0224 05:17:06.917031 1 containers_image.go:311] \"applied layer\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"e0a6b29c-f40a-4427-a24d-31f6b1047406\" layer=4\nE0224 05:17:22.074141 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0224 05:17:35.061901 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0224 05:17:35.062118 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-02-24T05:14:55Z","finishedAt":"2026-02-24T05:17:35Z","containerID":"cri-o://189c37430c077be09301cf49e843b65676efb76e5d67d2ea4dd214f2f7102ef5"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","containerID":"cri-o://54cc6a7eea7de4886fcefce8b98bd35f27338eed7eb5d39d1aa4df2fed85d25a","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-fzp4b","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515147232330023215 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115147232330025425 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715147232330025134 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715147232330025125 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315147232330022245 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515147232330026701 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115147232330023404 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115147232330023200 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115147232330025470 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115147232330025274 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"ab545c70-7e26-4dc0-b725-b7290e58519f","resourceVersion":"3995","generation":2,"creationTimestamp":"2026-02-24T05:09:45Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515147232330026733 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"7c4c7deb-654d-4867-b649-1bded139350a","resourceVersion":"6680","generation":1,"creationTimestamp":"2026-02-24T05:15:12Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"047037e6-2683-4c2b-8f9c-0646d3d14a01","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715147232330024021 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"4a9d4f36-999c-400a-816c-acc1a9a4b82f","resourceVersion":"3994","generation":2,"creationTimestamp":"2026-02-24T05:13:31Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"047037e6-2683-4c2b-8f9c-0646d3d14a01","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537215147232330030633 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"cdaf584e-0f8e-4302-845b-81d1f2165422","resourceVersion":"8704","generation":2,"creationTimestamp":"2026-02-24T05:18:50Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115147232330032104 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"2e78049c-fcb1-4633-809b-9a755bcae169","resourceVersion":"9558","generation":2,"creationTimestamp":"2026-02-24T05:19:19Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102615147232330024771 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"47b36405-f09a-44ae-bf2f-a7ea34ecc08b","resourceVersion":"9566","generation":2,"creationTimestamp":"2026-02-24T05:19:19Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315147232330023442 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"23be0f0d-5d58-4e3a-be59-5cb0d487bfeb","resourceVersion":"5318","generation":1,"creationTimestamp":"2026-02-24T05:14:54Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015147232330022045 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"d2f6e255-a8e3-40c3-be5e-ce102aea6f4c","resourceVersion":"5285","generation":1,"creationTimestamp":"2026-02-24T05:14:54Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-24T05:14:54Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615147232330025500 0ustar0000000000000000{"metadata":{"name":"edit","uid":"24b49fe9-22d2-4401-a5a0-5340d64afb22","resourceVersion":"8860","creationTimestamp":"2026-02-24T05:07:36Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315147232330025641 0ustar0000000000000000{"metadata":{"name":"admin","uid":"735afab9-a75e-4b1e-ba3c-8c4abde9d9ee","resourceVersion":"8859","creationTimestamp":"2026-02-24T05:07:36Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/pod/openshift-cluster-version/cluster-version-operator-57476485-7g2gq.json0000640000000000000000000001341015147232330026177 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-57476485-7g2gq","generateName":"cluster-version-operator-57476485-","namespace":"openshift-cluster-version","uid":"0e05783d-6bd1-4c71-87d9-1eb3edd827b3","resourceVersion":"6644","creationTimestamp":"2026-02-24T05:15:10Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"57476485"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-57476485","uid":"1d9fce80-055c-46e1-bd13-8e55e59252cf","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:11Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:11Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:11Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-24T05:15:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-24T05:15:10Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-02-24T05:15:11Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","containerID":"cri-o://883402f37d06428c5ac9d5006756ff5c514e20caeb827c4b80ee87b11ce334df","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415147232330011022 0ustar000000000000000082e69bb1-9637-4881-b4f1-c1eaa0106a7econfig/version.json0000640000000000000000000000717615147232330013100 0ustar0000000000000000{"metadata":{"name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","resourceVersion":"8838","generation":2,"creationTimestamp":"2026-02-24T05:08:53Z"},"spec":{"clusterID":"82e69bb1-9637-4881-b4f1-c1eaa0106a7e","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.33","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","url":"https://access.redhat.com/errata/RHSA-2026:2078","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-02-24T05:09:17Z","completionTime":null,"version":"4.18.33","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","verified":false}],"observedGeneration":2,"versionHash":"aMIRe2pH-Eo=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-02-24T05:09:17Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-02-24T05:09:17Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-02-24T05:09:17Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-02-24T05:09:17Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-02-24T05:09:17Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-02-24T05:18:51Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, baremetal, cloud-controller-manager, cloud-credential, cluster-autoscaler, config-operator, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, machine-config, monitoring, openshift-apiserver, openshift-samples, operator-lifecycle-manager, storage are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 906): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 906): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (823 of 906): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (827 of 906): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-24T05:09:17Z","reason":"MultipleErrors","message":"Unable to apply 4.18.33: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615147232330027476 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"26ce91ef-e652-4cd5-a278-f294f253d309","resourceVersion":"4734","generation":2,"creationTimestamp":"2026-02-24T05:14:49Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215147232330020174 0ustar0000000000000000[]config/oauth.json0000640000000000000000000000114415147232330012520 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"022ad26f-0c17-41d7-8417-d9746fbb6480","resourceVersion":"1609","generation":1,"creationTimestamp":"2026-02-24T05:09:35Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/node/master-0.json0000640000000000000000000000551415147232330013762 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"22108df1-f7be-4c01-83d3-1c6b04e1f28e","resourceVersion":"9645","creationTimestamp":"2026-02-24T05:13:07Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330220Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179244Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-02-24T05:19:20Z","lastTransitionTime":"2026-02-24T05:13:07Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-02-24T05:19:20Z","lastTransitionTime":"2026-02-24T05:13:07Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-02-24T05:19:20Z","lastTransitionTime":"2026-02-24T05:13:07Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-02-24T05:19:20Z","lastTransitionTime":"2026-02-24T05:14:23Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.109.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202602022246-0","containerRuntimeVersion":"cri-o://1.31.13-6.rhaos4.18.git7ed6156.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"runc","features":{"recursiveReadOnlyMounts":true}},{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}}]}}config/image.json0000640000000000000000000000111715147232330012462 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6cca4f82-3d0e-4911-b319-f28ceae684e8","resourceVersion":"1475","generation":1,"creationTimestamp":"2026-02-24T05:09:33Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/network.json0000640000000000000000000000117015147232330013070 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"7694a3b1-b493-4dd1-ad9a-1d3cd5287f34","resourceVersion":"3073","generation":2,"creationTimestamp":"2026-02-24T05:08:49Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}events/openshift-machine-api.json0000640000000000000000000000043615147232330015612 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-24T05:15:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"control-plane-machine-set-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"}]}config/apiserver.json0000640000000000000000000000121615147232330013400 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"a267e588-6df2-4bf3-9a13-253f04813bce","resourceVersion":"967","generation":1,"creationTimestamp":"2026-02-24T05:09:21Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/infrastructure.json0000640000000000000000000000106515147232330014462 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"33e02ff7-53d7-48a9-a836-8e1937bfeba2","resourceVersion":"546","generation":1,"creationTimestamp":"2026-02-24T05:08:48Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/machineconfigpools/worker.json0000640000000000000000000000106515147232330016562 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-24T05:19:05Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"9300","uid":"5f405587-6124-494c-98be-101eb952e51b"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117215147232330016543 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-24T05:19:05Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"9299","uid":"c186e72b-780c-4aa2-a52e-f6cae858a39d"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/featuregate.json0000640000000000000000000000613615147232330013702 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"f8c6a59f-1cd2-450e-8967-28d3f2a69083","resourceVersion":"648","generation":1,"creationTimestamp":"2026-02-24T05:09:10Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.33","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115147232330027746 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"73a54dac-4641-4a19-831a-14d871494fc7","resourceVersion":"9658","generation":1,"creationTimestamp":"2026-02-24T05:19:19Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-24T05:19:20Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-02-24T05:19:20Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-02-24T05:19:20Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-24T05:19:20Z","reason":"AsExpected"}]}}config/ingress.json0000640000000000000000000000043615147232330013055 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"91ddc88b-f66a-4e82-9d0c-121db33cd70e","resourceVersion":"558","generation":1,"creationTimestamp":"2026-02-24T05:08:48Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/proxy.json0000640000000000000000000000031315147232330012556 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"9afb9231-0373-45e0-a600-d8ffdf632774","resourceVersion":"562","generation":1,"creationTimestamp":"2026-02-24T05:08:49Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/schedulers/cluster.json0000640000000000000000000000052415147232330015223 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"d9f2193d-9c4c-4e74-afbf-cb7908b56d70","resourceVersion":"568","generation":1,"creationTimestamp":"2026-02-24T05:08:51Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000174015147232330025114 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"55fabe91-1112-4c6a-a252-402d193e87e7","resourceVersion":"9400","generation":1,"creationTimestamp":"2026-02-24T05:09:35Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":0,"currentHealthy":0,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"False","observedGeneration":1,"lastTransitionTime":"2026-02-24T05:09:35Z","reason":"InsufficientPods","message":""}]}}config/authentication.json0000640000000000000000000000132315147232330014416 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"aa3cdbaf-0c5c-43a1-b1fa-877595ca19f3","resourceVersion":"6033","generation":2,"creationTimestamp":"2026-02-24T05:09:25Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"78771bb9-c59c-457a-8297-58ea06596914"}]},"spec":{"type":"","oauthMetadata":{"name":""},"webhookTokenAuthenticator":{"kubeConfig":{"name":"webhook-authentication-integrated-oauth"}},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}