--- apiVersion: apps/v1 items: - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "2" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "4" operator.openshift.io/spec-hash: d9ae8b4959baf40685eb369e460639e19102941059d1caea50bc114b6c31cc21 release.openshift.io/version: 4.18.25 creationTimestamp: "2025-10-14T13:08:31Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 55bcd8787f managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"25d605bf-d1cb-41a5-821d-b2330d7679a4"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2025-10-14T13:12:01Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2025-10-14T13:12:01Z" name: controller-manager-55bcd8787f namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 25d605bf-d1cb-41a5-821d-b2330d7679a4 resourceVersion: "12227" uid: c29c23d6-254f-4fdf-bfc8-c5f70f8414ad spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 55bcd8787f template: metadata: annotations: configmaps/client-ca: "0" configmaps/config: "6650" configmaps/openshift-global-ca: "5110" configmaps/openshift-service-ca: "6047" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 55bcd8787f name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5950bf8a793f25392f3fdfa898a2bfe0998be83e86a5f93c07a9d22a0816b9c6 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "3" deployment.kubernetes.io/max-replicas: "3" deployment.kubernetes.io/revision: "6" operator.openshift.io/spec-hash: 5c4d1de6abc87c6578f67382d9edc45f93c45626fbfabe23fe75ae29feac2571 release.openshift.io/version: 4.18.25 creationTimestamp: "2025-10-14T13:12:01Z" generation: 5 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 56cfb99cfd managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"25d605bf-d1cb-41a5-821d-b2330d7679a4"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2025-10-14T13:22:41Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2025-10-14T13:22:41Z" name: controller-manager-56cfb99cfd namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 25d605bf-d1cb-41a5-821d-b2330d7679a4 resourceVersion: "22736" uid: 07d673ae-7fab-4ade-a6a7-27de218a7d73 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 56cfb99cfd template: metadata: annotations: configmaps/client-ca: "12150" configmaps/config: "12196" configmaps/openshift-global-ca: "5110" configmaps/openshift-service-ca: "6047" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 56cfb99cfd name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5950bf8a793f25392f3fdfa898a2bfe0998be83e86a5f93c07a9d22a0816b9c6 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 5 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "2" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "1" operator.openshift.io/spec-hash: 6f34f32367df820ab618d66653d25ed18e5750b9d778e1966de82705aa9befb2 release.openshift.io/version: 4.18.25 creationTimestamp: "2025-10-14T13:08:11Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 5d9b59775c managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"25d605bf-d1cb-41a5-821d-b2330d7679a4"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2025-10-14T13:08:14Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2025-10-14T13:08:14Z" name: controller-manager-5d9b59775c namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 25d605bf-d1cb-41a5-821d-b2330d7679a4 resourceVersion: "5332" uid: 5ce0640d-0695-4d54-aeb6-bd87b70d3545 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 5d9b59775c template: metadata: annotations: configmaps/client-ca: "0" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "1" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 5d9b59775c name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5950bf8a793f25392f3fdfa898a2bfe0998be83e86a5f93c07a9d22a0816b9c6 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "2" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "2" operator.openshift.io/spec-hash: beb198c0868e65e542fd6484ef7110f50f9fe14f8ce7cc4c7b6fccaac0ef8698 release.openshift.io/version: 4.18.25 creationTimestamp: "2025-10-14T13:08:12Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6687f866cc managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"25d605bf-d1cb-41a5-821d-b2330d7679a4"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2025-10-14T13:08:31Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2025-10-14T13:08:31Z" name: controller-manager-6687f866cc namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 25d605bf-d1cb-41a5-821d-b2330d7679a4 resourceVersion: "6669" uid: c80519e7-3649-4e80-afae-ec70f173799e spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 6687f866cc template: metadata: annotations: configmaps/client-ca: "0" configmaps/config: "5104" configmaps/openshift-global-ca: "5107" configmaps/openshift-service-ca: "5106" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6687f866cc name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5950bf8a793f25392f3fdfa898a2bfe0998be83e86a5f93c07a9d22a0816b9c6 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "3" deployment.kubernetes.io/max-replicas: "3" deployment.kubernetes.io/revision: "8" operator.openshift.io/spec-hash: 646d101f9496b9b59eac1d91d377936ccc735dbdb0bb93300f1a6f932fd6250e release.openshift.io/version: 4.18.25 creationTimestamp: "2025-10-14T13:20:06Z" generation: 5 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 66975b7c4d managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"25d605bf-d1cb-41a5-821d-b2330d7679a4"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2025-10-14T13:22:55Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2025-10-14T13:22:57Z" name: controller-manager-66975b7c4d namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 25d605bf-d1cb-41a5-821d-b2330d7679a4 resourceVersion: "23051" uid: 59f62919-583e-4afc-b234-9d8871301057 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 66975b7c4d template: metadata: annotations: configmaps/client-ca: "12150" configmaps/config: "18437" configmaps/openshift-global-ca: "5110" configmaps/openshift-service-ca: "6047" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "4" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 66975b7c4d name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5950bf8a793f25392f3fdfa898a2bfe0998be83e86a5f93c07a9d22a0816b9c6 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 5 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "2" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "7" operator.openshift.io/spec-hash: 469c99baba290ee5b9c03d21659a9d7774b69f1e3971d4654c92421f8c63273f release.openshift.io/version: 4.18.25 creationTimestamp: "2025-10-14T13:19:07Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 779655cdb managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"25d605bf-d1cb-41a5-821d-b2330d7679a4"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2025-10-14T13:20:07Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2025-10-14T13:20:07Z" name: controller-manager-779655cdb namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 25d605bf-d1cb-41a5-821d-b2330d7679a4 resourceVersion: "18481" uid: 8899e2dd-d352-4a57-bbfa-8f175670873b spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 779655cdb template: metadata: annotations: configmaps/client-ca: "12150" configmaps/config: "17215" configmaps/openshift-global-ca: "5110" configmaps/openshift-service-ca: "6047" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "3" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 779655cdb name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5950bf8a793f25392f3fdfa898a2bfe0998be83e86a5f93c07a9d22a0816b9c6 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "3" deployment.kubernetes.io/max-replicas: "3" deployment.kubernetes.io/revision: "9" operator.openshift.io/spec-hash: a4540e2b53172471a62e900ab22a2ead454bb39ee5417902d2796172ba7a6411 release.openshift.io/version: 4.18.25 creationTimestamp: "2025-10-14T13:22:06Z" generation: 4 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 78c5d9fccd managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"25d605bf-d1cb-41a5-821d-b2330d7679a4"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2025-10-14T13:22:56Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:availableReplicas: {} f:fullyLabeledReplicas: {} f:observedGeneration: {} f:readyReplicas: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2025-10-14T13:22:59Z" name: controller-manager-78c5d9fccd namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 25d605bf-d1cb-41a5-821d-b2330d7679a4 resourceVersion: "23155" uid: 61dda563-c07c-4eb3-a172-eafd504402eb spec: replicas: 3 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 78c5d9fccd template: metadata: annotations: configmaps/client-ca: "12150" configmaps/config: "20480" configmaps/openshift-global-ca: "5110" configmaps/openshift-service-ca: "6047" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "5" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 78c5d9fccd name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5950bf8a793f25392f3fdfa898a2bfe0998be83e86a5f93c07a9d22a0816b9c6 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: availableReplicas: 3 fullyLabeledReplicas: 3 observedGeneration: 4 readyReplicas: 3 replicas: 3 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "2" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "5" operator.openshift.io/spec-hash: cd0343a73968933bab6edd39dc83f28c3503f3e819881a34bb99d30461c00dbd release.openshift.io/version: 4.18.25 creationTimestamp: "2025-10-14T13:12:00Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 86659fd8d managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"25d605bf-d1cb-41a5-821d-b2330d7679a4"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2025-10-14T13:12:08Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2025-10-14T13:12:08Z" name: controller-manager-86659fd8d namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 25d605bf-d1cb-41a5-821d-b2330d7679a4 resourceVersion: "12450" uid: cd5e72ad-0d77-41c5-a3b0-ab33a261d057 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 86659fd8d template: metadata: annotations: configmaps/client-ca: "12150" configmaps/config: "6650" configmaps/openshift-global-ca: "5110" configmaps/openshift-service-ca: "6047" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 86659fd8d name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5950bf8a793f25392f3fdfa898a2bfe0998be83e86a5f93c07a9d22a0816b9c6 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "2" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "3" operator.openshift.io/spec-hash: e42bbaa098bb9e36b73ada36102eb7d2f30f9b19eec301144fd77ead1eeeb9bc release.openshift.io/version: 4.18.25 creationTimestamp: "2025-10-14T13:08:14Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: bcf7659b managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"25d605bf-d1cb-41a5-821d-b2330d7679a4"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2025-10-14T13:12:00Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2025-10-14T13:12:01Z" name: controller-manager-bcf7659b namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 25d605bf-d1cb-41a5-821d-b2330d7679a4 resourceVersion: "12178" uid: e85467e0-a881-4079-b256-ea89f0ddda8b spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: bcf7659b template: metadata: annotations: configmaps/client-ca: "0" configmaps/config: "5303" configmaps/openshift-global-ca: "5110" configmaps/openshift-service-ca: "5106" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: bcf7659b name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5950bf8a793f25392f3fdfa898a2bfe0998be83e86a5f93c07a9d22a0816b9c6 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 kind: ReplicaSetList metadata: resourceVersion: "61797"