insights-operator/gathers.json0000640000000000000000000005253515145477673015306 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":23475,"records_count":82,"errors":["the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-r7r6p.json\" was already recorded and had the fingerprint \"cf5303c29d359aca6b62976431fe27f0221b0bb004006969544b29ded16a820f\", overwriting with the record having fingerprint \"cf5303c29d359aca6b62976431fe27f0221b0bb004006969544b29ded16a820f\"","the record with the same name \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-lbfvq.json\" was already recorded and had the fingerprint \"b4a428f5f56703ce491dc0b00170e254e76cfc653496c970f18f6b291e4d9bf4\", overwriting with the record having fingerprint \"b4a428f5f56703ce491dc0b00170e254e76cfc653496c970f18f6b291e4d9bf4\"","the record with the same name \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-k7xlc.json\" was already recorded and had the fingerprint \"510a8c9c8708fdd284b37b6680885ff1d39c086f786de90906f231480041da1b\", overwriting with the record having fingerprint \"510a8c9c8708fdd284b37b6680885ff1d39c086f786de90906f231480041da1b\"","the record with the same name \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-w5pp8.json\" was already recorded and had the fingerprint \"439fd7ca6b0d3631d58d170a756116bfd1c62174e2a7f91af8d7b73756d35045\", overwriting with the record having fingerprint \"439fd7ca6b0d3631d58d170a756116bfd1c62174e2a7f91af8d7b73756d35045\"","the record with the same name \"config/pod/openshift-catalogd/catalogd-controller-manager-84b8d9d697-jhj9q.json\" was already recorded and had the fingerprint \"1cab450f496bf84a93d9a0d245203f6944051b8504da9747e63d960690f8ba34\", overwriting with the record having fingerprint \"1cab450f496bf84a93d9a0d245203f6944051b8504da9747e63d960690f8ba34\"","the record with the same name \"config/pod/openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-s559q.json\" was already recorded and had the fingerprint \"20a5e7b2c752aa79a174fb48574cb44dd16cb744d4d93fd20ecf6b84e5426edf\", overwriting with the record having fingerprint \"20a5e7b2c752aa79a174fb48574cb44dd16cb744d4d93fd20ecf6b84e5426edf\"","the record with the same name \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-mcz8l.json\" was already recorded and had the fingerprint \"df875a4e5d102fafa1c81326d9fc63ae8733c6352fe7c23c2ae32eaf601db002\", overwriting with the record having fingerprint \"df875a4e5d102fafa1c81326d9fc63ae8733c6352fe7c23c2ae32eaf601db002\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-r7r6p.json\" was already recorded and had the fingerprint \"cf5303c29d359aca6b62976431fe27f0221b0bb004006969544b29ded16a820f\", overwriting with the record having fingerprint \"cf5303c29d359aca6b62976431fe27f0221b0bb004006969544b29ded16a820f\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-r7r6p/etcd-operator_previous.log\" was already recorded and had the fingerprint \"54f7552c14213b86a140b67f8855c30cd2de0e35a814df5801c94af98560c758\", overwriting with the record having fingerprint \"54f7552c14213b86a140b67f8855c30cd2de0e35a814df5801c94af98560c758\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-r7r6p/etcd-operator_current.log\" was already recorded and had the fingerprint \"74eb8ca2fe3b1798121e858f272b1cbd0517a9f87a6a7fd0d91e6e529e8a64c5\", overwriting with the record having fingerprint \"74eb8ca2fe3b1798121e858f272b1cbd0517a9f87a6a7fd0d91e6e529e8a64c5\"","the record with the same name \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5-c7c8v.json\" was already recorded and had the fingerprint \"73ad32b0525562bd17d3c77f14986cfec973dc68ce823eba7c65c44111822b70\", overwriting with the record having fingerprint \"73ad32b0525562bd17d3c77f14986cfec973dc68ce823eba7c65c44111822b70\"","the record with the same name \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-8tbg8.json\" was already recorded and had the fingerprint \"2f50ec4f501134cea06e76f34673fb3158f60ad9644ee133d831a9f1db47eb47\", overwriting with the record having fingerprint \"2f50ec4f501134cea06e76f34673fb3158f60ad9644ee133d831a9f1db47eb47\""],"warnings":["warning: the record with the same fingerprint \"cf5303c29d359aca6b62976431fe27f0221b0bb004006969544b29ded16a820f\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-r7r6p.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-r7r6p.json\"","warning: the record with the same fingerprint \"b4a428f5f56703ce491dc0b00170e254e76cfc653496c970f18f6b291e4d9bf4\" was already recorded at path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-lbfvq.json\", recording another one with a different path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-lbfvq.json\"","warning: the record with the same fingerprint \"510a8c9c8708fdd284b37b6680885ff1d39c086f786de90906f231480041da1b\" was already recorded at path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-k7xlc.json\", recording another one with a different path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-k7xlc.json\"","warning: the record with the same fingerprint \"439fd7ca6b0d3631d58d170a756116bfd1c62174e2a7f91af8d7b73756d35045\" was already recorded at path \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-w5pp8.json\", recording another one with a different path \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-w5pp8.json\"","warning: the record with the same fingerprint \"1cab450f496bf84a93d9a0d245203f6944051b8504da9747e63d960690f8ba34\" was already recorded at path \"config/pod/openshift-catalogd/catalogd-controller-manager-84b8d9d697-jhj9q.json\", recording another one with a different path \"config/pod/openshift-catalogd/catalogd-controller-manager-84b8d9d697-jhj9q.json\"","warning: the record with the same fingerprint \"20a5e7b2c752aa79a174fb48574cb44dd16cb744d4d93fd20ecf6b84e5426edf\" was already recorded at path \"config/pod/openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-s559q.json\", recording another one with a different path \"config/pod/openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-s559q.json\"","warning: the record with the same fingerprint \"df875a4e5d102fafa1c81326d9fc63ae8733c6352fe7c23c2ae32eaf601db002\" was already recorded at path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-mcz8l.json\", recording another one with a different path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-mcz8l.json\"","warning: the record with the same fingerprint \"cf5303c29d359aca6b62976431fe27f0221b0bb004006969544b29ded16a820f\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-r7r6p.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-r7r6p.json\"","warning: the record with the same fingerprint \"54f7552c14213b86a140b67f8855c30cd2de0e35a814df5801c94af98560c758\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-r7r6p/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-r7r6p/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"74eb8ca2fe3b1798121e858f272b1cbd0517a9f87a6a7fd0d91e6e529e8a64c5\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-r7r6p/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-r7r6p/etcd-operator_current.log\"","warning: the record with the same fingerprint \"73ad32b0525562bd17d3c77f14986cfec973dc68ce823eba7c65c44111822b70\" was already recorded at path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5-c7c8v.json\", recording another one with a different path \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5-c7c8v.json\"","warning: the record with the same fingerprint \"2f50ec4f501134cea06e76f34673fb3158f60ad9644ee133d831a9f1db47eb47\" was already recorded at path \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-8tbg8.json\", recording another one with a different path \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-8tbg8.json\""],"panic":null},{"name":"workloads","duration_in_ms":5430,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":83,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig","duration_in_ms":23486,"records_count":181,"errors":["function \"machine_autoscalers\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-r7r6p.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-lbfvq.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-k7xlc.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-w5pp8.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-catalogd/catalogd-controller-manager-84b8d9d697-jhj9q.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-s559q.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-mcz8l.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-r7r6p.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-r7r6p/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-r7r6p/etcd-operator_current.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5-c7c8v.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-8tbg8.json\""],"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":40,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":42,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":51,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":55,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":94,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":109,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":39,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":62,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":41,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":85,"records_count":20,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":174,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11610,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":32,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":41,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":55,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":3,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":42,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":102,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":40,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":42,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5430,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":40,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":30,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":41,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":42,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":64,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":137,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":164,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":29,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":10,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":39,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":43,"records_count":5,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":88,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":41,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":64,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":50,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":61,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":265,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":3,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":31,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":11,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":30,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":41,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10863,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":39,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":41,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":41,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":77.509,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515145477673020005 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515145477673021107 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005270415145477673014270 0ustar0000000000000000{"pods":77,"imageCount":64,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:b1d840665bf310fa455ddaff9b262dd0649440ca9ecf34d49b340ce669885568","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:16ea15164e7d71550d4c0e2c90d17f96edda4ab77123947b2e188ffb23951fa0","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:86ce6c3977c663ad9ad9a5d627bb08727af38fd3153a0a463a10b534030ee126","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:01d70013efcb6bd53533de62b00867982cc8cfd7ea2bcc920f1a89ec9a1e0a93","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:6c7ec917f0eff7b41d7174f1b5fdc4ce53ad106e51599afba731a8431ff9caa7","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:2f02611c935b387581e1c3be693869fdf266797ea7c5bcb704c0b6e7d0a6f12f","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:6c7ec917f0eff7b41d7174f1b5fdc4ce53ad106e51599afba731a8431ff9caa7","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:f42321072d0ab781f41e8f595ed6f5efabe791e472c7d0784e61b3c214194656","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:518982b9ad8a8bfb7bb3b4216b235cac99e126df3bb48e390b36064560c76b83","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:6c7ec917f0eff7b41d7174f1b5fdc4ce53ad106e51599afba731a8431ff9caa7","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:0dcba5d04f25f6e382ffecdd94057bd8a99cffb6a00a8c7da186e9871ae459ea","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:6c7ec917f0eff7b41d7174f1b5fdc4ce53ad106e51599afba731a8431ff9caa7","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a1b426a276216372c7d688fe60e9eaf251efd35071f94e1bcd4337f51a90fd75","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:034588ffd95ce834e866279bf80a45af2cddda631c6c9a6344c1bb2e033fd83e","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":1,"terminalCount":1,"shapes":[]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8ff40a2d97bf7a95e19303f7e972b7e8354a3864039111c6d33d5479117aaeed","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ebf883de8fd905490f0c9b420a5d6446ecde18e12e15364f6dcd4e885104972c","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce89154fa3fe1e87c660e644b58cf125fede575869fd5841600082c0d1f858a3","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:17a6e47ea4e958d63504f51c1bd512d7747ed786448c187b247a63d6ac12b7d6","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:17a6e47ea4e958d63504f51c1bd512d7747ed786448c187b247a63d6ac12b7d6","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2ba8aec9f09d75121b95d2e6f1097415302c0ae7121fa7076fd38d7adb9a5afa","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f0d9c600139873871d5398d5f5dd37153cbc58db7cb6a22d464f390615a0aed6","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:572b0ca6e993beea2ee9346197665e56a2e4999fbb6958c747c48a35bf72ee34","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4797a485fd4ab3414ba8d52bdf2afccefab6c657b1d259baad703fca5145124c","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:107d0b66a0b081fa2f9ab28965bb268093061321d71c56fba884e29613866285","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:0100af7f7148850360b455fb2535d72d417bf5d68eca583d1d7a40c849aae350","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f86073cf0561e4b69668f8917ef5184cb0ef5aa16d0fefe38118f1167b268721","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000010435415145477665033640 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-7d77f88776-s4jxm2026-02-19T03:12:32.141881106Z I0219 03:12:32.141864 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:12:32.141975389Z I0219 03:12:32.141933 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:12:32.141975389Z I0219 03:12:32.141960 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:12:32.142029161Z I0219 03:12:32.141998 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-19T03:12:32.142029161Z I0219 03:12:32.142014 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:12:32.142239947Z I0219 03:12:32.142204 1 secure_serving.go:213] Serving securely on [::]:5443 2026-02-19T03:12:32.142316379Z I0219 03:12:32.142290 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::apiserver.local.config/certificates/apiserver.crt::apiserver.local.config/certificates/apiserver.key" 2026-02-19T03:12:32.142366711Z I0219 03:12:32.142334 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:12:32.142366711Z I0219 03:12:32.142358 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:12:32.142420482Z I0219 03:12:32.142385 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:12:32.142420482Z I0219 03:12:32.142411 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:12:32.142649179Z I0219 03:12:32.142612 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:12:32.144298247Z I0219 03:12:32.144269 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:12:32.144298247Z I0219 03:12:32.144292 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:12:32.242313717Z I0219 03:12:32.242072 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-19T03:12:32.242313717Z I0219 03:12:32.242104 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:12:32.242313717Z I0219 03:12:32.242082 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-19T03:12:32.242618386Z I0219 03:12:32.242577 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:12:32.242671407Z I0219 03:12:32.242648 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:12:32.246304813Z I0219 03:12:32.244917 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:12:32.270331882Z E0219 03:12:32.270270 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.270375803Z E0219 03:12:32.270323 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.270375803Z E0219 03:12:32.270329 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.270375803Z E0219 03:12:32.270350 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.270447015Z E0219 03:12:32.270268 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.284408421Z E0219 03:12:32.283862 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.284408421Z E0219 03:12:32.283890 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.284408421Z E0219 03:12:32.284092 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.284408421Z E0219 03:12:32.284130 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.284408421Z E0219 03:12:32.284206 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.284649378Z E0219 03:12:32.284612 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.289416507Z E0219 03:12:32.289187 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.366913061Z E0219 03:12:32.365731 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.366913061Z E0219 03:12:32.365813 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.366913061Z E0219 03:12:32.365871 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.366913061Z E0219 03:12:32.366038 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.366913061Z E0219 03:12:32.366187 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.698457222Z E0219 03:12:32.698385 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.703044185Z E0219 03:12:32.702969 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.703112207Z E0219 03:12:32.703076 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.703289293Z E0219 03:12:32.703245 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.704654462Z E0219 03:12:32.704609 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:33.146514742Z W0219 03:12:33.146434 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.229.112:50051: connect: connection refused" 2026-02-19T03:12:33.146514742Z W0219 03:12:33.146500 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.42.195:50051: connect: connection refused" 2026-02-19T03:12:33.352308837Z E0219 03:12:33.351610 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:33.352308837Z E0219 03:12:33.351981 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:33.352308837Z E0219 03:12:33.352133 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:33.352308837Z E0219 03:12:33.352299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:33.356321093Z E0219 03:12:33.352465 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:33.376211632Z W0219 03:12:33.376016 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.91.47:50051: connect: connection refused" 2026-02-19T03:12:33.770159658Z time="2026-02-19T03:12:33Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-02-19T03:12:33.770432196Z time="2026-02-19T03:12:33Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.91.47:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-02-19T03:12:33.971002919Z W0219 03:12:33.970927 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.30.25:50051: connect: connection refused" 2026-02-19T03:12:34.354747068Z time="2026-02-19T03:12:34Z" level=warning msg="error getting package stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.30.25:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-02-19T03:12:34.372426722Z time="2026-02-19T03:12:34Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-02-19T03:12:34.372496844Z time="2026-02-19T03:12:34Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.30.25:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-02-19T03:12:34.380082495Z W0219 03:12:34.379531 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.91.47:50051: connect: connection refused" 2026-02-19T03:12:34.612155053Z W0219 03:12:34.612051 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.42.195:50051: connect: connection refused" 2026-02-19T03:12:34.640675112Z E0219 03:12:34.640618 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:34.641082384Z E0219 03:12:34.640897 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:34.641082384Z E0219 03:12:34.641046 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:34.641291870Z E0219 03:12:34.641197 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:34.641441445Z E0219 03:12:34.641353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:34.980182636Z W0219 03:12:34.980107 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.30.25:50051: connect: connection refused" 2026-02-19T03:12:35.068580436Z W0219 03:12:35.068047 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.229.112:50051: connect: connection refused" 2026-02-19T03:12:36.031344784Z W0219 03:12:36.031216 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.91.47:50051: connect: connection refused" 2026-02-19T03:12:36.864590036Z W0219 03:12:36.864489 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.30.25:50051: connect: connection refused" 2026-02-19T03:12:37.034232219Z W0219 03:12:37.034190 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.42.195:50051: connect: connection refused" 2026-02-19T03:12:37.210079293Z E0219 03:12:37.206999 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:37.210079293Z E0219 03:12:37.207094 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:37.210079293Z E0219 03:12:37.207100 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:37.210079293Z E0219 03:12:37.206999 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:37.210079293Z E0219 03:12:37.206999 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:37.220785414Z W0219 03:12:37.220708 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.229.112:50051: connect: connection refused" 2026-02-19T03:12:38.535331231Z W0219 03:12:38.534051 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.91.47:50051: connect: connection refused" 2026-02-19T03:12:38.967429257Z W0219 03:12:38.967384 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.30.25:50051: connect: connection refused" 2026-02-19T03:12:40.195291634Z E0219 03:12:40.195223 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.195517331Z E0219 03:12:40.195490 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.195637844Z E0219 03:12:40.195602 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.198369274Z E0219 03:12:40.195687 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.198659632Z E0219 03:12:40.195608 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.389549423Z W0219 03:12:40.389494 1 logging.go:55] [core] [Channel #2 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.42.195:50051: connect: connection refused" 2026-02-19T03:12:41.756919076Z W0219 03:12:41.756860 1 logging.go:55] [core] [Channel #1 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.229.112:50051: connect: connection refused" 2026-02-19T03:12:42.335229624Z E0219 03:12:42.334238 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.335229624Z E0219 03:12:42.334281 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.335229624Z E0219 03:12:42.334324 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.335229624Z E0219 03:12:42.334238 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.335229624Z E0219 03:12:42.334452 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.370671055Z W0219 03:12:42.370640 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.91.47:50051: connect: connection refused" 2026-02-19T03:12:42.560001771Z time="2026-02-19T03:12:42Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-02-19T03:12:42.560035402Z time="2026-02-19T03:12:42Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.30.25:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-02-19T03:12:42.599388976Z W0219 03:12:42.598924 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.30.25:50051: connect: connection refused" 2026-02-19T03:12:43.563637847Z time="2026-02-19T03:12:43Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-02-19T03:12:43.563637847Z time="2026-02-19T03:12:43Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.229.112:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-02-19T03:12:44.620239144Z time="2026-02-19T03:12:44Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-02-19T03:12:44.620239144Z time="2026-02-19T03:12:44Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.42.195:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-02-19T03:12:46.586591913Z time="2026-02-19T03:12:46Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-02-19T03:12:46.586591913Z time="2026-02-19T03:12:46Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.30.25:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-02-19T03:12:48.358749387Z time="2026-02-19T03:12:48Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-02-19T03:12:48.358830960Z time="2026-02-19T03:12:48Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.91.47:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" package-server-manager_current.log0000640000000000000000000000136515145477665037022 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c75f78c8b-8tbg82026-02-19T03:11:14.377942782Z 2026-02-19T03:11:14Z INFO setup starting manager 2026-02-19T03:11:14.379832407Z I0219 03:11:14.379779 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-02-19T03:11:14.380005012Z 2026-02-19T03:11:14Z INFO controller-runtime.metrics Starting metrics server 2026-02-19T03:11:14.381904578Z 2026-02-19T03:11:14Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-02-19T03:11:14.382443884Z 2026-02-19T03:11:14Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-02-19T03:11:14.383999029Z 2026-02-19T03:11:14Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} kube-rbac-proxy_current.log0000640000000000000000000000160415145477665035521 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c75f78c8b-8tbg82026-02-19T03:05:28.353319661Z W0219 03:05:28.351461 1 deprecated.go:66] 2026-02-19T03:05:28.353319661Z ==== Removed Flag Warning ====================== 2026-02-19T03:05:28.353319661Z 2026-02-19T03:05:28.353319661Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-19T03:05:28.353319661Z 2026-02-19T03:05:28.353319661Z =============================================== 2026-02-19T03:05:28.353319661Z 2026-02-19T03:05:28.353319661Z I0219 03:05:28.352040 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-19T03:05:28.353460944Z I0219 03:05:28.353324 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-19T03:05:28.353660630Z I0219 03:05:28.353615 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-19T03:05:28.354235555Z I0219 03:05:28.354217 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 package-server-manager_previous.log0000640000000000000000000004600615145477665037215 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c75f78c8b-8tbg82026-02-19T03:05:39.661095888Z 2026-02-19T03:05:39Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:39.975297945Z 2026-02-19T03:05:39Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:39.975297945Z 2026-02-19T03:05:39Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:05:40.012812031Z 2026-02-19T03:05:40Z INFO controllers.packageserver attempting to create the packageserver csv 2026-02-19T03:05:40.025535462Z 2026-02-19T03:05:40Z INFO controllers.packageserver updating csv spec 2026-02-19T03:05:40.047929063Z 2026-02-19T03:05:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-02-19T03:05:40.047929063Z 2026-02-19T03:05:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:40.047984064Z 2026-02-19T03:05:40Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:05:40.047984064Z 2026-02-19T03:05:40Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:40.048079647Z 2026-02-19T03:05:40Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:40.048090797Z 2026-02-19T03:05:40Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:05:40.071681130Z 2026-02-19T03:05:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:05:40.071681130Z 2026-02-19T03:05:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:40.071783433Z 2026-02-19T03:05:40Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:05:40.071783433Z 2026-02-19T03:05:40Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:40.071878485Z 2026-02-19T03:05:40Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:40.071920726Z 2026-02-19T03:05:40Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:05:40.092192710Z 2026-02-19T03:05:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:05:40.092192710Z 2026-02-19T03:05:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:40.092407026Z 2026-02-19T03:05:40Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:05:40.092407026Z 2026-02-19T03:05:40Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:40.096158326Z 2026-02-19T03:05:40Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:40.096158326Z 2026-02-19T03:05:40Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:05:40.111369284Z 2026-02-19T03:05:40Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:05:40.111369284Z 2026-02-19T03:05:40Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:41.434490489Z 2026-02-19T03:05:41Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:05:41.434490489Z 2026-02-19T03:05:41Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:41.434490489Z 2026-02-19T03:05:41Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:41.434543350Z 2026-02-19T03:05:41Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:05:41.452680037Z 2026-02-19T03:05:41Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:05:41.452680037Z 2026-02-19T03:05:41Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:42.179047777Z 2026-02-19T03:05:42Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:05:42.179047777Z 2026-02-19T03:05:42Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:42.179101429Z 2026-02-19T03:05:42Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:42.179129529Z 2026-02-19T03:05:42Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:05:42.199732352Z 2026-02-19T03:05:42Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:05:42.199791603Z 2026-02-19T03:05:42Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:43.038581838Z 2026-02-19T03:05:43Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:05:43.038581838Z 2026-02-19T03:05:43Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:43.038644030Z 2026-02-19T03:05:43Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:05:43.038688631Z 2026-02-19T03:05:43Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:05:43.065364086Z 2026-02-19T03:05:43Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:05:43.065364086Z 2026-02-19T03:05:43Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:07:13.550441428Z E0219 03:07:13.550250 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-19T03:08:13.554420291Z E0219 03:08:13.554327 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-02-19T03:09:47.564380957Z E0219 03:09:47.564275 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-19T03:10:31.301998235Z 2026-02-19T03:10:31Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:10:31.301998235Z 2026-02-19T03:10:31Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:10:31.302075198Z 2026-02-19T03:10:31Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:10:31.304453987Z 2026-02-19T03:10:31Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:10:31.316839679Z 2026-02-19T03:10:31Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:10:31.316839679Z 2026-02-19T03:10:31Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:10:32.672116345Z 2026-02-19T03:10:32Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:10:32.672116345Z 2026-02-19T03:10:32Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:10:32.672154316Z 2026-02-19T03:10:32Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:10:32.672195307Z 2026-02-19T03:10:32Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:10:32.691781980Z 2026-02-19T03:10:32Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:10:32.691781980Z 2026-02-19T03:10:32Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:10:33.080493457Z 2026-02-19T03:10:33Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:10:33.080493457Z 2026-02-19T03:10:33Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:10:33.080493457Z 2026-02-19T03:10:33Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:10:33.080493457Z 2026-02-19T03:10:33Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:10:33.092827867Z 2026-02-19T03:10:33Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:10:33.092827867Z 2026-02-19T03:10:33Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:10:39.542418494Z E0219 03:10:39.542185 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-operator-lifecycle-manager/leases/packageserver-controller-lock": context deadline exceeded 2026-02-19T03:10:39.542418494Z I0219 03:10:39.542396 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition 2026-02-19T03:11:11.045247209Z 2026-02-19T03:11:11Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:11:11.045247209Z 2026-02-19T03:11:11Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:11:11.045247209Z 2026-02-19T03:11:11Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:11:11.045247209Z 2026-02-19T03:11:11Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:11:11.062327838Z 2026-02-19T03:11:11Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:11:11.062327838Z 2026-02-19T03:11:11Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:11:12.397320129Z 2026-02-19T03:11:12Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:11:12.397409502Z 2026-02-19T03:11:12Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:11:12.397544126Z 2026-02-19T03:11:12Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:11:12.397615908Z 2026-02-19T03:11:12Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:11:12.412452082Z 2026-02-19T03:11:12Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:11:12.412452082Z 2026-02-19T03:11:12Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:11:13.139997609Z 2026-02-19T03:11:13Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-19T03:11:13.139997609Z 2026-02-19T03:11:13Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:11:13.140068051Z 2026-02-19T03:11:13Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:11:13.140068051Z 2026-02-19T03:11:13Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-19T03:11:13.169499201Z 2026-02-19T03:11:13Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-19T03:11:13.169499201Z 2026-02-19T03:11:13Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-19T03:11:13.547145616Z E0219 03:11:13.547080 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:11:13.547392753Z 2026-02-19T03:11:13Z ERROR setup problem running manager {"error": "leader election lost"} 2026-02-19T03:11:13.547392753Z main.run 2026-02-19T03:11:13.547392753Z /build/cmd/package-server-manager/main.go:150 2026-02-19T03:11:13.547392753Z github.com/spf13/cobra.(*Command).execute 2026-02-19T03:11:13.547392753Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-02-19T03:11:13.547392753Z github.com/spf13/cobra.(*Command).ExecuteC 2026-02-19T03:11:13.547392753Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-02-19T03:11:13.547392753Z github.com/spf13/cobra.(*Command).Execute 2026-02-19T03:11:13.547392753Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-02-19T03:11:13.547392753Z main.main 2026-02-19T03:11:13.547392753Z /build/cmd/package-server-manager/main.go:43 2026-02-19T03:11:13.547392753Z runtime.main 2026-02-19T03:11:13.547392753Z /usr/lib/golang/src/runtime/proc.go:271 2026-02-19T03:11:13.547444754Z Error: leader election lost 2026-02-19T03:11:13.547478275Z encountered an error while executing the binary: leader election lost config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-8tbg8.json0000640000000000000000000002343715145477665030260 0ustar0000000000000000{"metadata":{"name":"package-server-manager-5c75f78c8b-8tbg8","generateName":"package-server-manager-5c75f78c8b-","namespace":"openshift-operator-lifecycle-manager","uid":"98ac5423-b231-44e5-9545-424d635ed6ee","resourceVersion":"9061","creationTimestamp":"2026-02-19T03:03:32Z","labels":{"app":"package-server-manager","pod-template-hash":"5c75f78c8b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"package-server-manager-5c75f78c8b","uid":"908a1a8c-de0d-49ab-b981-c554d44ec813","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"package-server-manager-serving-cert","secret":{"secretName":"package-server-manager-serving-cert","defaultMode":420}},{"name":"kube-api-access-bq27v","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://127.0.0.1:9090/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--logtostderr=true"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-bq27v","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}},{"name":"package-server-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","command":["/bin/psm","start"],"args":["--name","$(PACKAGESERVER_NAME)","--namespace","$(PACKAGESERVER_NAMESPACE)","--metrics=:9090"],"env":[{"name":"PACKAGESERVER_NAME","value":"packageserver"},{"name":"PACKAGESERVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7"},{"name":"PACKAGESERVER_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"GOMEMLIMIT","value":"5MiB"}],"resources":{"requests":{"cpu":"10m","memory":"10Mi"}},"volumeMounts":[{"name":"kube-api-access-bq27v","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:46Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:46Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2026-02-19T03:04:48Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-19T03:05:28Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://3f993ca8915a297c51b2fc6e7cff3a27c10dcc04c963feba0fcb6153f8ccb1bc","started":true,"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-bq27v","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"package-server-manager","state":{"running":{"startedAt":"2026-02-19T03:11:14Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"rs.packageserver\tfinished request reconciliation\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\n2026-02-19T03:11:13Z\tINFO\tcontrollers.packageserver\thandling current request\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}, \"request\": \"openshift-operator-lifecycle-manager/packageserver\"}\n2026-02-19T03:11:13Z\tINFO\tcontrollers.packageserver\tchecking to see if required RBAC exists\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\n2026-02-19T03:11:13Z\tINFO\tcontrollers.packageserver\tconfimed required RBAC exists\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\n2026-02-19T03:11:13Z\tINFO\tcontrollers.packageserver\tcurrently topology mode\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}, \"highly available\": false}\n2026-02-19T03:11:13Z\tINFO\tcontrollers.packageserver\treconciliation result\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}, \"res\": \"unchanged\"}\n2026-02-19T03:11:13Z\tINFO\tcontrollers.packageserver\tfinished request reconciliation\t{\"csv\": {\"name\":\"packageserver\",\"namespace\":\"openshift-operator-lifecycle-manager\"}}\nE0219 03:11:13.547080 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\n2026-02-19T03:11:13Z\tERROR\tsetup\tproblem running manager\t{\"error\": \"leader election lost\"}\nmain.run\n\t/build/cmd/package-server-manager/main.go:150\ngithub.com/spf13/cobra.(*Command).execute\n\t/build/vendor/github.com/spf13/cobra/command.go:985\ngithub.com/spf13/cobra.(*Command).ExecuteC\n\t/build/vendor/github.com/spf13/cobra/command.go:1117\ngithub.com/spf13/cobra.(*Command).Execute\n\t/build/vendor/github.com/spf13/cobra/command.go:1041\nmain.main\n\t/build/cmd/package-server-manager/main.go:43\nruntime.main\n\t/usr/lib/golang/src/runtime/proc.go:271\nError: leader election lost\nencountered an error while executing the binary: leader election lost\n","startedAt":"2026-02-19T03:05:38Z","finishedAt":"2026-02-19T03:11:13Z","containerID":"cri-o://fe4faf0d4ffb2ebe11ee7bb3c950e62a3098091a94099dff9022e530a80d494a"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","containerID":"cri-o://4eaad01f93ee8b4305631434a093be13923a43fc42e41b75e5ee71770a4807d1","started":true,"volumeMounts":[{"name":"kube-api-access-bq27v","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}olm-operator_current.log0000640000000000000000000005177415145477665033271 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-5499d7f7bb-kk77t2026-02-19T03:12:41.997941516Z time="2026-02-19T03:12:41Z" level=info msg="install strategy successful" csv=packageserver id=DmP2q namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:42.101156047Z time="2026-02-19T03:12:42Z" level=info msg="install strategy successful" csv=packageserver id=p8xRQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:42.106423680Z time="2026-02-19T03:12:42Z" level=info msg="install strategy successful" csv=packageserver id=IwbNM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:42.112065904Z time="2026-02-19T03:12:42Z" level=info msg="install strategy successful" csv=packageserver id=tzEd6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:42.205885223Z time="2026-02-19T03:12:42Z" level=info msg="install strategy successful" csv=packageserver id=VqBri namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:42.310743432Z time="2026-02-19T03:12:42Z" level=info msg="install strategy successful" csv=packageserver id=0MFAE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:42.402610814Z time="2026-02-19T03:12:42Z" level=info msg="install strategy successful" csv=packageserver id=nq25p namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:42.504308231Z time="2026-02-19T03:12:42Z" level=info msg="install strategy successful" csv=packageserver id=oNbbg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:42.603354091Z time="2026-02-19T03:12:42Z" level=info msg="install strategy successful" csv=packageserver id=1epXN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:42.704017589Z time="2026-02-19T03:12:42Z" level=info msg="install strategy successful" csv=packageserver id=v/kfk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:42.804310435Z time="2026-02-19T03:12:42Z" level=info msg="install strategy successful" csv=packageserver id=vszb2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:42.904212401Z time="2026-02-19T03:12:42Z" level=info msg="install strategy successful" csv=packageserver id=YSY82 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:43.002840229Z time="2026-02-19T03:12:43Z" level=info msg="install strategy successful" csv=packageserver id=/TNVG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:43.107814632Z time="2026-02-19T03:12:43Z" level=info msg="install strategy successful" csv=packageserver id=xmvKn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:43.204017709Z time="2026-02-19T03:12:43Z" level=info msg="install strategy successful" csv=packageserver id=glq6O namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:43.305647625Z time="2026-02-19T03:12:43Z" level=info msg="install strategy successful" csv=packageserver id=8qWqq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:43.402651846Z time="2026-02-19T03:12:43Z" level=info msg="install strategy successful" csv=packageserver id=1kpf+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:43.502591232Z time="2026-02-19T03:12:43Z" level=info msg="install strategy successful" csv=packageserver id=Z8IYM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:43.603147886Z time="2026-02-19T03:12:43Z" level=info msg="install strategy successful" csv=packageserver id=rNy0K namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:43.708942533Z time="2026-02-19T03:12:43Z" level=info msg="install strategy successful" csv=packageserver id=2iFqB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:43.806631194Z time="2026-02-19T03:12:43Z" level=info msg="install strategy successful" csv=packageserver id=9SkDF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:44.384732575Z time="2026-02-19T03:12:44Z" level=info msg="install strategy successful" csv=packageserver id=vAPVD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:44.606875855Z time="2026-02-19T03:12:44Z" level=info msg="install strategy successful" csv=packageserver id=I4fZh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:44.725025451Z time="2026-02-19T03:12:44Z" level=info msg="install strategy successful" csv=packageserver id=P6O6C namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:44.805086983Z time="2026-02-19T03:12:44Z" level=info msg="install strategy successful" csv=packageserver id=yPFCQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:44.971481610Z time="2026-02-19T03:12:44Z" level=info msg="install strategy successful" csv=packageserver id=9OXeN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.561913615Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=cKh+k namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.660231204Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=hhAIt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.687027555Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=mQj4z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.694087543Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=PTIx9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.701201972Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=8r/Kk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.711373062Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=DWg6X namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.718579345Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=Z+3jG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.725496949Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=HWEDE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.733194066Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=3H4SF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.739649706Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=7yBtZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.746167368Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=AMPCV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.755850394Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=yXRXi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.767369973Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=PZg1Z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.793303458Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=7kwzl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.890946547Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=PajJh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.905580599Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=cVJXH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.923528698Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=/Ca9P namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.932315457Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=KIwJL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.939216891Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=dM/sr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:46.978359675Z time="2026-02-19T03:12:46Z" level=info msg="install strategy successful" csv=packageserver id=kOWzS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:47.078993182Z time="2026-02-19T03:12:47Z" level=info msg="install strategy successful" csv=packageserver id=Q8q+E namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:47.183681459Z time="2026-02-19T03:12:47Z" level=info msg="install strategy successful" csv=packageserver id=n1vvO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:47.279892616Z time="2026-02-19T03:12:47Z" level=info msg="install strategy successful" csv=packageserver id=v3JH1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:47.378494093Z time="2026-02-19T03:12:47Z" level=info msg="install strategy successful" csv=packageserver id=RGREw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:47.479159212Z time="2026-02-19T03:12:47Z" level=info msg="install strategy successful" csv=packageserver id=TTpOx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:47.605292771Z time="2026-02-19T03:12:47Z" level=info msg="install strategy successful" csv=packageserver id=Vo3RQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:47.706049032Z time="2026-02-19T03:12:47Z" level=info msg="install strategy successful" csv=packageserver id=Vg6eu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:47.806562315Z time="2026-02-19T03:12:47Z" level=info msg="install strategy successful" csv=packageserver id=IgeDn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:47.877922080Z time="2026-02-19T03:12:47Z" level=info msg="install strategy successful" csv=packageserver id=HP7Af namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:47.978527396Z time="2026-02-19T03:12:47Z" level=info msg="install strategy successful" csv=packageserver id=LxvCE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:48.078283727Z time="2026-02-19T03:12:48Z" level=info msg="install strategy successful" csv=packageserver id=rrSN+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:48.190171487Z time="2026-02-19T03:12:48Z" level=info msg="install strategy successful" csv=packageserver id=gRbV8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:48.291482874Z time="2026-02-19T03:12:48Z" level=info msg="install strategy successful" csv=packageserver id=XBuy9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:48.389968168Z time="2026-02-19T03:12:48Z" level=info msg="install strategy successful" csv=packageserver id=puNft namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:48.491099940Z time="2026-02-19T03:12:48Z" level=info msg="install strategy successful" csv=packageserver id=hAVFS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:48.593095597Z time="2026-02-19T03:12:48Z" level=info msg="install strategy successful" csv=packageserver id=VbevV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:48.690803268Z time="2026-02-19T03:12:48Z" level=info msg="install strategy successful" csv=packageserver id=0j4ZX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:48.790299032Z time="2026-02-19T03:12:48Z" level=info msg="install strategy successful" csv=packageserver id=YenzC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:48.893626848Z time="2026-02-19T03:12:48Z" level=info msg="install strategy successful" csv=packageserver id=8QxDH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:48.994075290Z time="2026-02-19T03:12:48Z" level=info msg="install strategy successful" csv=packageserver id=vDpIp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:49.097296883Z time="2026-02-19T03:12:49Z" level=info msg="install strategy successful" csv=packageserver id=bkeC9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:49.197717984Z time="2026-02-19T03:12:49Z" level=info msg="install strategy successful" csv=packageserver id=OTgD9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:49.295494797Z time="2026-02-19T03:12:49Z" level=info msg="install strategy successful" csv=packageserver id=WGA4S namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:49.396604659Z time="2026-02-19T03:12:49Z" level=info msg="install strategy successful" csv=packageserver id=wivGO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:49.477155424Z time="2026-02-19T03:12:49Z" level=info msg="install strategy successful" csv=packageserver id=vHoui namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:49.579589024Z time="2026-02-19T03:12:49Z" level=info msg="install strategy successful" csv=packageserver id=LmKXV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:49.677498301Z time="2026-02-19T03:12:49Z" level=info msg="install strategy successful" csv=packageserver id=6KEbY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:49.800627902Z time="2026-02-19T03:12:49Z" level=info msg="install strategy successful" csv=packageserver id=9V2GK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:49.895980734Z time="2026-02-19T03:12:49Z" level=info msg="install strategy successful" csv=packageserver id=mjvXs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:49.996935530Z time="2026-02-19T03:12:49Z" level=info msg="install strategy successful" csv=packageserver id=VjIiN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:50.078106094Z time="2026-02-19T03:12:50Z" level=info msg="install strategy successful" csv=packageserver id=ckKOC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:50.178495304Z time="2026-02-19T03:12:50Z" level=info msg="install strategy successful" csv=packageserver id=wNsCq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:50.277055790Z time="2026-02-19T03:12:50Z" level=info msg="install strategy successful" csv=packageserver id=DtIHH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:50.379344526Z time="2026-02-19T03:12:50Z" level=info msg="install strategy successful" csv=packageserver id=ShLPO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:50.479299734Z time="2026-02-19T03:12:50Z" level=info msg="install strategy successful" csv=packageserver id=mSb3O namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:50.577725046Z time="2026-02-19T03:12:50Z" level=info msg="install strategy successful" csv=packageserver id=L35IK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:50.680330051Z time="2026-02-19T03:12:50Z" level=info msg="install strategy successful" csv=packageserver id=YiW4S namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:50.779545237Z time="2026-02-19T03:12:50Z" level=info msg="install strategy successful" csv=packageserver id=DMjJC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:50.880633327Z time="2026-02-19T03:12:50Z" level=info msg="install strategy successful" csv=packageserver id=J/A/h namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:50.982835181Z time="2026-02-19T03:12:50Z" level=info msg="install strategy successful" csv=packageserver id=DOuD+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:51.077562824Z time="2026-02-19T03:12:51Z" level=info msg="install strategy successful" csv=packageserver id=h6ywl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:51.179906892Z time="2026-02-19T03:12:51Z" level=info msg="install strategy successful" csv=packageserver id=sLJN5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:51.277485529Z time="2026-02-19T03:12:51Z" level=info msg="install strategy successful" csv=packageserver id=FvZyD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:51.378024804Z time="2026-02-19T03:12:51Z" level=info msg="install strategy successful" csv=packageserver id=vkRBw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:51.480384782Z time="2026-02-19T03:12:51Z" level=info msg="install strategy successful" csv=packageserver id=PbF+K namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:51.578037561Z time="2026-02-19T03:12:51Z" level=info msg="install strategy successful" csv=packageserver id=tFFxa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:51.680699648Z time="2026-02-19T03:12:51Z" level=info msg="install strategy successful" csv=packageserver id=5gsCL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:51.780478550Z time="2026-02-19T03:12:51Z" level=info msg="install strategy successful" csv=packageserver id=npLRL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:51.878683766Z time="2026-02-19T03:12:51Z" level=info msg="install strategy successful" csv=packageserver id=FEfX+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:51.978549141Z time="2026-02-19T03:12:51Z" level=info msg="install strategy successful" csv=packageserver id=Hc5dO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:52.078838078Z time="2026-02-19T03:12:52Z" level=info msg="install strategy successful" csv=packageserver id=aeqt7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:52.178328102Z time="2026-02-19T03:12:52Z" level=info msg="install strategy successful" csv=packageserver id=adYZl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:52.280883236Z time="2026-02-19T03:12:52Z" level=info msg="install strategy successful" csv=packageserver id=BHik/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-19T03:12:52.378592657Z time="2026-02-19T03:12:52Z" level=info msg="install strategy successful" csv=packageserver id=X6nuH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000006002615145477665035121 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-596f79dd6f-sbzsk2026-02-19T03:12:42.553377148Z time="2026-02-19T03:12:42Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-v9c2b current-pod.namespace=openshift-marketplace id=XDN3p 2026-02-19T03:12:42.553377148Z time="2026-02-19T03:12:42Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-v9c2b current-pod.namespace=openshift-marketplace id=XDN3p 2026-02-19T03:12:42.553474701Z time="2026-02-19T03:12:42Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XDN3p 2026-02-19T03:12:42.553474701Z time="2026-02-19T03:12:42Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=XDN3p 2026-02-19T03:12:42.560876746Z time="2026-02-19T03:12:42Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:42.560876746Z time="2026-02-19T03:12:42Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:43.351854968Z time="2026-02-19T03:12:43Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:43.351854968Z time="2026-02-19T03:12:43Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nrcnx current-pod.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:43.351920320Z time="2026-02-19T03:12:43Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nrcnx current-pod.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:43.351920320Z time="2026-02-19T03:12:43Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=l2KbL 2026-02-19T03:12:43.351920320Z time="2026-02-19T03:12:43Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:43.351920320Z time="2026-02-19T03:12:43Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:43.551041591Z time="2026-02-19T03:12:43Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=jvAoI 2026-02-19T03:12:43.551226546Z time="2026-02-19T03:12:43Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-5t9dd current-pod.namespace=openshift-marketplace id=jvAoI 2026-02-19T03:12:43.551226546Z time="2026-02-19T03:12:43Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-5t9dd current-pod.namespace=openshift-marketplace id=jvAoI 2026-02-19T03:12:43.551491814Z time="2026-02-19T03:12:43Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=jvAoI 2026-02-19T03:12:43.551491814Z time="2026-02-19T03:12:43Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=jvAoI 2026-02-19T03:12:43.564461001Z time="2026-02-19T03:12:43Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:43.564461001Z time="2026-02-19T03:12:43Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:44.384229581Z time="2026-02-19T03:12:44Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:44.384361805Z time="2026-02-19T03:12:44Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-v9c2b current-pod.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:44.384361805Z time="2026-02-19T03:12:44Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-v9c2b current-pod.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:44.384393735Z time="2026-02-19T03:12:44Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=wSBt6 2026-02-19T03:12:44.384393735Z time="2026-02-19T03:12:44Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:44.384415026Z time="2026-02-19T03:12:44Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:44.607117062Z time="2026-02-19T03:12:44Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:44.607247646Z time="2026-02-19T03:12:44Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nrcnx current-pod.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:44.607247646Z time="2026-02-19T03:12:44Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nrcnx current-pod.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:44.607839103Z time="2026-02-19T03:12:44Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:44.607839103Z time="2026-02-19T03:12:44Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=l2KbL 2026-02-19T03:12:44.618950367Z time="2026-02-19T03:12:44Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:44.619030889Z time="2026-02-19T03:12:44Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:46.563252085Z time="2026-02-19T03:12:46Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:46.563252085Z time="2026-02-19T03:12:46Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-5t9dd current-pod.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:46.563252085Z time="2026-02-19T03:12:46Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-5t9dd current-pod.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:46.563252085Z time="2026-02-19T03:12:46Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=yqALB 2026-02-19T03:12:46.563252085Z time="2026-02-19T03:12:46Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:46.563252085Z time="2026-02-19T03:12:46Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:46.563845782Z time="2026-02-19T03:12:46Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:46.564094600Z time="2026-02-19T03:12:46Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-v9c2b current-pod.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:46.564156432Z time="2026-02-19T03:12:46Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-v9c2b current-pod.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:46.567703736Z time="2026-02-19T03:12:46Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:46.567703736Z time="2026-02-19T03:12:46Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=wSBt6 2026-02-19T03:12:46.585754208Z time="2026-02-19T03:12:46Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:46.585754208Z time="2026-02-19T03:12:46Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:46.589610692Z time="2026-02-19T03:12:46Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:46.589610692Z time="2026-02-19T03:12:46Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-5t9dd current-pod.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:46.589610692Z time="2026-02-19T03:12:46Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-5t9dd current-pod.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:46.589610692Z time="2026-02-19T03:12:46Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:46.589610692Z time="2026-02-19T03:12:46Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=yqALB 2026-02-19T03:12:46.589610692Z time="2026-02-19T03:12:46Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:46.589610692Z time="2026-02-19T03:12:46Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:46.594063183Z time="2026-02-19T03:12:46Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:46.594166576Z time="2026-02-19T03:12:46Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nrcnx current-pod.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:46.594166576Z time="2026-02-19T03:12:46Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nrcnx current-pod.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:46.594179217Z time="2026-02-19T03:12:46Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=J5XXz 2026-02-19T03:12:46.594179217Z time="2026-02-19T03:12:46Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:46.594179217Z time="2026-02-19T03:12:46Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:47.154376855Z time="2026-02-19T03:12:47Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:47.154472028Z time="2026-02-19T03:12:47Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-nqnbc current-pod.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:47.154484318Z time="2026-02-19T03:12:47Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-nqnbc current-pod.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:47.154495088Z time="2026-02-19T03:12:47Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=iMmeU 2026-02-19T03:12:47.154505809Z time="2026-02-19T03:12:47Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:47.154505809Z time="2026-02-19T03:12:47Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:47.753819200Z time="2026-02-19T03:12:47Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:47.753941904Z time="2026-02-19T03:12:47Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nrcnx current-pod.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:47.753941904Z time="2026-02-19T03:12:47Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nrcnx current-pod.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:47.754269334Z time="2026-02-19T03:12:47Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:47.754269334Z time="2026-02-19T03:12:47Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J5XXz 2026-02-19T03:12:47.754406518Z time="2026-02-19T03:12:47Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:47.754406518Z time="2026-02-19T03:12:47Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:48.350001899Z time="2026-02-19T03:12:48Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:48.350113513Z time="2026-02-19T03:12:48Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-nqnbc current-pod.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:48.350113513Z time="2026-02-19T03:12:48Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-nqnbc current-pod.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:48.350200065Z time="2026-02-19T03:12:48Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:48.350200065Z time="2026-02-19T03:12:48Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=iMmeU 2026-02-19T03:12:48.359828169Z time="2026-02-19T03:12:48Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ycVXO 2026-02-19T03:12:48.359828169Z time="2026-02-19T03:12:48Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ycVXO 2026-02-19T03:12:48.553393357Z time="2026-02-19T03:12:48Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:48.553393357Z time="2026-02-19T03:12:48Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-v9c2b current-pod.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:48.553393357Z time="2026-02-19T03:12:48Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-v9c2b current-pod.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:48.553393357Z time="2026-02-19T03:12:48Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=SNazL 2026-02-19T03:12:48.553393357Z time="2026-02-19T03:12:48Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:48.553393357Z time="2026-02-19T03:12:48Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:49.150176983Z time="2026-02-19T03:12:49Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ycVXO 2026-02-19T03:12:49.150368858Z time="2026-02-19T03:12:49Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-nqnbc current-pod.namespace=openshift-marketplace id=ycVXO 2026-02-19T03:12:49.150454841Z time="2026-02-19T03:12:49Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-nqnbc current-pod.namespace=openshift-marketplace id=ycVXO 2026-02-19T03:12:49.150476641Z time="2026-02-19T03:12:49Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=ycVXO 2026-02-19T03:12:49.150476641Z time="2026-02-19T03:12:49Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ycVXO 2026-02-19T03:12:49.150497362Z time="2026-02-19T03:12:49Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ycVXO 2026-02-19T03:12:49.749286858Z time="2026-02-19T03:12:49Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:49.749393501Z time="2026-02-19T03:12:49Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-v9c2b current-pod.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:49.749393501Z time="2026-02-19T03:12:49Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-v9c2b current-pod.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:49.749505755Z time="2026-02-19T03:12:49Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:49.749505755Z time="2026-02-19T03:12:49Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SNazL 2026-02-19T03:12:50.149165199Z time="2026-02-19T03:12:50Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ycVXO 2026-02-19T03:12:50.149313833Z time="2026-02-19T03:12:50Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-nqnbc current-pod.namespace=openshift-marketplace id=ycVXO 2026-02-19T03:12:50.149313833Z time="2026-02-19T03:12:50Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-nqnbc current-pod.namespace=openshift-marketplace id=ycVXO 2026-02-19T03:12:50.150327453Z time="2026-02-19T03:12:50Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ycVXO 2026-02-19T03:12:50.150327453Z time="2026-02-19T03:12:50Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ycVXO route-controller-manager_current.log0000640000000000000000000004016315145477665037675 0ustar0000000000000000config/pod/openshift-route-controller-manager/logs/route-controller-manager-84d87bdd5b-7p6kp2026-02-19T03:11:16.277613376Z I0219 03:11:16.277382 1 cmd.go:240] Using service-serving-cert provided certificates 2026-02-19T03:11:16.277613376Z I0219 03:11:16.277537 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:11:16.277968727Z I0219 03:11:16.277903 1 observer_polling.go:159] Starting file observer 2026-02-19T03:11:16.278440991Z I0219 03:11:16.278400 1 builder.go:298] route-controller-manager version 4.18.0-202601302238.p2.gce6ffa2.assembly.stream.el9-ce6ffa2-ce6ffa24dac3a5f49f70818e1159e40eaf27a6a3 2026-02-19T03:11:16.279029118Z I0219 03:11:16.278970 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:11:16.722083465Z I0219 03:11:16.721999 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-19T03:11:16.730329546Z I0219 03:11:16.730244 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-19T03:11:16.730329546Z I0219 03:11:16.730302 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-19T03:11:16.730358937Z I0219 03:11:16.730351 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-19T03:11:16.730371317Z I0219 03:11:16.730363 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-19T03:11:16.737875137Z I0219 03:11:16.736733 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:11:16.737875137Z W0219 03:11:16.736756 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:16.737875137Z W0219 03:11:16.736761 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:16.737875137Z W0219 03:11:16.736766 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:11:16.737875137Z W0219 03:11:16.736770 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:11:16.737875137Z W0219 03:11:16.736773 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:11:16.737875137Z W0219 03:11:16.736776 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:11:16.737875137Z I0219 03:11:16.736807 1 genericapiserver.go:514] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-19T03:11:16.777583498Z I0219 03:11:16.777543 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-19T03:11:16.777914708Z I0219 03:11:16.777892 1 leaderelection.go:250] attempting to acquire leader lease openshift-route-controller-manager/openshift-route-controllers... 2026-02-19T03:11:16.779086402Z I0219 03:11:16.779053 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771470301\" (2026-02-19 03:05:14 +0000 UTC to 2028-02-19 03:05:15 +0000 UTC (now=2026-02-19 03:11:16.779001339 +0000 UTC))" 2026-02-19T03:11:16.779130353Z I0219 03:11:16.779081 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController 2026-02-19T03:11:16.779130353Z I0219 03:11:16.779097 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:11:16.779160484Z I0219 03:11:16.779140 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:11:16.779168964Z I0219 03:11:16.779159 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:16.779200785Z I0219 03:11:16.779188 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:11:16.779208255Z I0219 03:11:16.779199 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:16.779322639Z I0219 03:11:16.779300 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470676\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470676\" (2026-02-19 02:11:16 +0000 UTC to 2027-02-19 02:11:16 +0000 UTC (now=2026-02-19 03:11:16.779238336 +0000 UTC))" 2026-02-19T03:11:16.779349200Z I0219 03:11:16.779331 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-19T03:11:16.779395881Z I0219 03:11:16.779366 1 genericapiserver.go:662] [graceful-termination] waiting for shutdown to be initiated 2026-02-19T03:11:16.779423302Z I0219 03:11:16.779401 1 dynamic_serving_content.go:132] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:11:16.780466942Z I0219 03:11:16.779578 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" 2026-02-19T03:11:16.783894023Z I0219 03:11:16.783847 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:11:16.784340446Z I0219 03:11:16.784290 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:11:16.784784219Z I0219 03:11:16.784742 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:11:16.794334628Z I0219 03:11:16.794289 1 leaderelection.go:260] successfully acquired lease openshift-route-controller-manager/openshift-route-controllers 2026-02-19T03:11:16.795167252Z I0219 03:11:16.795121 1 controller_manager.go:36] Starting "openshift.io/ingress-ip" 2026-02-19T03:11:16.795167252Z I0219 03:11:16.795134 1 controller_manager.go:46] Started "openshift.io/ingress-ip" 2026-02-19T03:11:16.795167252Z I0219 03:11:16.795141 1 controller_manager.go:36] Starting "openshift.io/ingress-to-route" 2026-02-19T03:11:16.795403399Z I0219 03:11:16.795251 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-route-controller-manager", Name:"openshift-route-controllers", UID:"cbc65c76-b0a3-4219-90fa-dd0f7136864e", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"8179", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' route-controller-manager-84d87bdd5b-7p6kp_1239dbc4-fafb-4bce-b3bd-1e42aa6f3947 became leader 2026-02-19T03:11:16.879485418Z I0219 03:11:16.879399 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-19T03:11:16.879485418Z I0219 03:11:16.879419 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:16.879485418Z I0219 03:11:16.879378 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:16.879860869Z I0219 03:11:16.879823 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:48:35 +0000 UTC to 2036-02-17 02:48:35 +0000 UTC (now=2026-02-19 03:11:16.879779457 +0000 UTC))" 2026-02-19T03:11:16.879860869Z I0219 03:11:16.879856 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2026-02-20 02:55:16 +0000 UTC (now=2026-02-19 03:11:16.879844279 +0000 UTC))" 2026-02-19T03:11:16.879876499Z I0219 03:11:16.879869 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:11:16.879861629 +0000 UTC))" 2026-02-19T03:11:16.879887310Z I0219 03:11:16.879881 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:11:16.879873599 +0000 UTC))" 2026-02-19T03:11:16.879905830Z I0219 03:11:16.879892 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2036-02-17 02:55:14 +0000 UTC (now=2026-02-19 03:11:16.8798846 +0000 UTC))" 2026-02-19T03:11:16.879914491Z I0219 03:11:16.879908 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2026-02-20 02:55:14 +0000 UTC (now=2026-02-19 03:11:16.87990118 +0000 UTC))" 2026-02-19T03:11:16.880064025Z I0219 03:11:16.880037 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771470301\" (2026-02-19 03:05:14 +0000 UTC to 2028-02-19 03:05:15 +0000 UTC (now=2026-02-19 03:11:16.880024454 +0000 UTC))" 2026-02-19T03:11:16.880158258Z I0219 03:11:16.880134 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470676\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470676\" (2026-02-19 02:11:16 +0000 UTC to 2027-02-19 02:11:16 +0000 UTC (now=2026-02-19 03:11:16.880121627 +0000 UTC))" 2026-02-19T03:11:18.193333941Z I0219 03:11:18.193230 1 ingress.go:262] ingress-to-route metrics registered with prometheus 2026-02-19T03:11:18.193387743Z I0219 03:11:18.193324 1 controller_manager.go:46] Started "openshift.io/ingress-to-route" 2026-02-19T03:11:18.193387743Z I0219 03:11:18.193343 1 controller_manager.go:48] Started Route Controllers 2026-02-19T03:11:18.193555658Z I0219 03:11:18.193484 1 ingress.go:313] Starting controller 2026-02-19T03:11:18.202519560Z I0219 03:11:18.202298 1 reflector.go:359] Caches populated for *v1.IngressClass from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:11:18.206184707Z W0219 03:11:18.205759 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:11:18.206374392Z I0219 03:11:18.206300 1 reflector.go:359] Caches populated for *v1.Ingress from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:11:18.206767254Z E0219 03:11:18.206380 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:11:18.218300631Z I0219 03:11:18.218157 1 reflector.go:359] Caches populated for *v1.Service from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:11:18.273576278Z I0219 03:11:18.273499 1 reflector.go:359] Caches populated for *v1.Secret from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:11:19.559361249Z W0219 03:11:19.559272 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:11:19.559361249Z E0219 03:11:19.559312 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:11:21.569295309Z W0219 03:11:21.569147 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:11:21.569295309Z E0219 03:11:21.569196 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:11:27.806035598Z W0219 03:11:27.805936 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:11:27.806035598Z E0219 03:11:27.805990 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:11:40.520174696Z W0219 03:11:40.520112 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:11:40.520174696Z E0219 03:11:40.520153 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:12:04.044941666Z W0219 03:12:04.044829 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:12:04.044941666Z E0219 03:12:04.044873 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:12:43.178107686Z W0219 03:12:43.178016 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:12:43.178107686Z E0219 03:12:43.178056 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) route-controller-manager_previous.log0000640000000000000000000005304415145477665040071 0ustar0000000000000000config/pod/openshift-route-controller-manager/logs/route-controller-manager-84d87bdd5b-7p6kp2026-02-19T03:05:49.638132109Z I0219 03:05:49.637957 1 cmd.go:240] Using service-serving-cert provided certificates 2026-02-19T03:05:49.638132109Z I0219 03:05:49.638094 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:05:49.638470078Z I0219 03:05:49.638437 1 observer_polling.go:159] Starting file observer 2026-02-19T03:05:49.638941701Z I0219 03:05:49.638906 1 builder.go:298] route-controller-manager version 4.18.0-202601302238.p2.gce6ffa2.assembly.stream.el9-ce6ffa2-ce6ffa24dac3a5f49f70818e1159e40eaf27a6a3 2026-02-19T03:05:49.639737102Z I0219 03:05:49.639708 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:05:50.004211617Z I0219 03:05:50.004147 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-19T03:05:50.007500695Z I0219 03:05:50.007436 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-19T03:05:50.007500695Z I0219 03:05:50.007458 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-19T03:05:50.007500695Z I0219 03:05:50.007482 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-19T03:05:50.007500695Z I0219 03:05:50.007487 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-19T03:05:50.011492722Z I0219 03:05:50.011427 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:05:50.011492722Z W0219 03:05:50.011463 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:05:50.011492722Z W0219 03:05:50.011470 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:05:50.011492722Z I0219 03:05:50.011470 1 genericapiserver.go:514] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-19T03:05:50.011492722Z W0219 03:05:50.011476 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:05:50.011555394Z W0219 03:05:50.011502 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:05:50.011555394Z W0219 03:05:50.011507 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:05:50.011555394Z W0219 03:05:50.011511 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:05:50.014249886Z I0219 03:05:50.014215 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771470301\" (2026-02-19 03:05:14 +0000 UTC to 2028-02-19 03:05:15 +0000 UTC (now=2026-02-19 03:05:50.014180125 +0000 UTC))" 2026-02-19T03:05:50.014405531Z I0219 03:05:50.014382 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470349\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470349\" (2026-02-19 02:05:49 +0000 UTC to 2027-02-19 02:05:49 +0000 UTC (now=2026-02-19 03:05:50.014359169 +0000 UTC))" 2026-02-19T03:05:50.014444982Z I0219 03:05:50.014405 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-19T03:05:50.014444982Z I0219 03:05:50.014426 1 genericapiserver.go:662] [graceful-termination] waiting for shutdown to be initiated 2026-02-19T03:05:50.014458192Z I0219 03:05:50.014451 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController 2026-02-19T03:05:50.014467952Z I0219 03:05:50.014460 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:05:50.014613926Z I0219 03:05:50.014487 1 dynamic_serving_content.go:132] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:05:50.014613926Z I0219 03:05:50.014609 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" 2026-02-19T03:05:50.014733679Z I0219 03:05:50.014702 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:05:50.014733679Z I0219 03:05:50.014714 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:05:50.014733679Z I0219 03:05:50.014727 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:05:50.014733679Z I0219 03:05:50.014731 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:05:50.014829032Z I0219 03:05:50.014804 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-19T03:05:50.015149051Z I0219 03:05:50.015118 1 leaderelection.go:250] attempting to acquire leader lease openshift-route-controller-manager/openshift-route-controllers... 2026-02-19T03:05:50.018950873Z I0219 03:05:50.018906 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:05:50.019133677Z I0219 03:05:50.019071 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:05:50.019971870Z I0219 03:05:50.019938 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:05:50.024243024Z I0219 03:05:50.024198 1 leaderelection.go:260] successfully acquired lease openshift-route-controller-manager/openshift-route-controllers 2026-02-19T03:05:50.025740064Z I0219 03:05:50.025654 1 controller_manager.go:36] Starting "openshift.io/ingress-ip" 2026-02-19T03:05:50.025740064Z I0219 03:05:50.025670 1 controller_manager.go:46] Started "openshift.io/ingress-ip" 2026-02-19T03:05:50.025740064Z I0219 03:05:50.025678 1 controller_manager.go:36] Starting "openshift.io/ingress-to-route" 2026-02-19T03:05:50.026191666Z I0219 03:05:50.025876 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-route-controller-manager", Name:"openshift-route-controllers", UID:"cbc65c76-b0a3-4219-90fa-dd0f7136864e", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"7545", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' route-controller-manager-84d87bdd5b-7p6kp_6d560faa-8f3c-4ea6-96b2-f46bfcf1b488 became leader 2026-02-19T03:05:50.039948205Z I0219 03:05:50.039902 1 ingress.go:262] ingress-to-route metrics registered with prometheus 2026-02-19T03:05:50.039948205Z I0219 03:05:50.039930 1 controller_manager.go:46] Started "openshift.io/ingress-to-route" 2026-02-19T03:05:50.039948205Z I0219 03:05:50.039939 1 controller_manager.go:48] Started Route Controllers 2026-02-19T03:05:50.041010464Z I0219 03:05:50.040323 1 ingress.go:313] Starting controller 2026-02-19T03:05:50.042897825Z I0219 03:05:50.042870 1 reflector.go:359] Caches populated for *v1.IngressClass from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:05:50.043036538Z I0219 03:05:50.043000 1 reflector.go:359] Caches populated for *v1.Ingress from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:05:50.043065749Z W0219 03:05:50.043001 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:05:50.043146331Z E0219 03:05:50.043124 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:05:50.049891632Z I0219 03:05:50.049826 1 reflector.go:359] Caches populated for *v1.Service from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:05:50.096998686Z I0219 03:05:50.096934 1 reflector.go:359] Caches populated for *v1.Secret from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2026-02-19T03:05:50.114688829Z I0219 03:05:50.114626 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-19T03:05:50.114778041Z I0219 03:05:50.114754 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:05:50.114791232Z I0219 03:05:50.114778 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:05:50.115007658Z I0219 03:05:50.114972 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2026-02-20 02:55:14 +0000 UTC (now=2026-02-19 03:05:50.114925375 +0000 UTC))" 2026-02-19T03:05:50.115177482Z I0219 03:05:50.115152 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771470301\" (2026-02-19 03:05:14 +0000 UTC to 2028-02-19 03:05:15 +0000 UTC (now=2026-02-19 03:05:50.115134571 +0000 UTC))" 2026-02-19T03:05:50.115308036Z I0219 03:05:50.115281 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470349\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470349\" (2026-02-19 02:05:49 +0000 UTC to 2027-02-19 02:05:49 +0000 UTC (now=2026-02-19 03:05:50.115268695 +0000 UTC))" 2026-02-19T03:05:50.115417549Z I0219 03:05:50.115392 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:48:35 +0000 UTC to 2036-02-17 02:48:35 +0000 UTC (now=2026-02-19 03:05:50.115381048 +0000 UTC))" 2026-02-19T03:05:50.115417549Z I0219 03:05:50.115410 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2026-02-20 02:55:16 +0000 UTC (now=2026-02-19 03:05:50.115402158 +0000 UTC))" 2026-02-19T03:05:50.115435299Z I0219 03:05:50.115427 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:05:50.115419319 +0000 UTC))" 2026-02-19T03:05:50.115511171Z I0219 03:05:50.115496 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:05:50.115432519 +0000 UTC))" 2026-02-19T03:05:50.115519251Z I0219 03:05:50.115512 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2036-02-17 02:55:14 +0000 UTC (now=2026-02-19 03:05:50.115503781 +0000 UTC))" 2026-02-19T03:05:50.115572593Z I0219 03:05:50.115524 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2026-02-20 02:55:14 +0000 UTC (now=2026-02-19 03:05:50.115516981 +0000 UTC))" 2026-02-19T03:05:50.115694036Z I0219 03:05:50.115669 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771470301\" (2026-02-19 03:05:14 +0000 UTC to 2028-02-19 03:05:15 +0000 UTC (now=2026-02-19 03:05:50.115655935 +0000 UTC))" 2026-02-19T03:05:50.115784918Z I0219 03:05:50.115765 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470349\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470349\" (2026-02-19 02:05:49 +0000 UTC to 2027-02-19 02:05:49 +0000 UTC (now=2026-02-19 03:05:50.115756518 +0000 UTC))" 2026-02-19T03:05:51.008951582Z W0219 03:05:51.008884 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:05:51.008951582Z E0219 03:05:51.008924 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:05:52.947034069Z W0219 03:05:52.946961 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:05:52.947034069Z E0219 03:05:52.947004 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:05:58.202744850Z W0219 03:05:58.202673 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:05:58.202744850Z E0219 03:05:58.202718 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:06:09.209891356Z W0219 03:06:09.209814 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:06:09.209891356Z E0219 03:06:09.209860 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:06:29.035686514Z W0219 03:06:29.035569 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:06:29.035686514Z E0219 03:06:29.035605 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:07:05.069548006Z W0219 03:07:05.069453 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:07:05.069548006Z E0219 03:07:05.069516 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:07:24.039922313Z E0219 03:07:24.039826 1 leaderelection.go:340] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-19T03:08:00.876608850Z W0219 03:08:00.876525 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:08:00.876608850Z E0219 03:08:00.876578 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:08:24.041304445Z E0219 03:08:24.041221 1 leaderelection.go:347] error retrieving resource lock openshift-route-controller-manager/openshift-route-controllers: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io openshift-route-controllers) 2026-02-19T03:08:54.305633870Z W0219 03:08:54.305525 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:08:54.305633870Z E0219 03:08:54.305585 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:09:32.767018925Z W0219 03:09:32.766905 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:09:32.767018925Z E0219 03:09:32.766975 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:09:58.045786514Z E0219 03:09:58.045661 1 leaderelection.go:340] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-19T03:10:14.296617740Z W0219 03:10:14.296525 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:10:14.296617740Z E0219 03:10:14.296569 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:10:50.035448126Z E0219 03:10:50.035352 1 leaderelection.go:347] error retrieving resource lock openshift-route-controller-manager/openshift-route-controllers: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-route-controller-manager/leases/openshift-route-controllers?timeout=4m0s": context deadline exceeded 2026-02-19T03:10:50.035448126Z I0219 03:10:50.035417 1 leaderelection.go:285] failed to renew lease openshift-route-controller-manager/openshift-route-controllers: timed out waiting for the condition 2026-02-19T03:11:05.388526091Z W0219 03:11:05.388464 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:11:05.388526091Z E0219 03:11:05.388499 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:11:15.601433633Z W0219 03:11:15.599953 1 leaderelection.go:84] leader election lost config/pod/openshift-route-controller-manager/route-controller-manager-84d87bdd5b-7p6kp.json0000640000000000000000000001523215145477665030506 0ustar0000000000000000{"metadata":{"name":"route-controller-manager-84d87bdd5b-7p6kp","generateName":"route-controller-manager-84d87bdd5b-","namespace":"openshift-route-controller-manager","uid":"ac7a5635-30b4-4076-babb-db1abd26da88","resourceVersion":"8183","creationTimestamp":"2026-02-19T03:05:40Z","labels":{"app":"route-controller-manager","openshift-route-controller-manager-anti-affinity":"true","pod-template-hash":"84d87bdd5b","route-controller-manager":"true"},"annotations":{"configmaps/client-ca":"6885","configmaps/config":"5543","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.50/23\"],\"mac_address\":\"0a:58:0a:80:00:32\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.50/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.50\"\n ],\n \"mac\": \"0a:58:0a:80:00:32\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","openshiftcontrollermanagers.operator.openshift.io/cluster":"2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"route-controller-manager-84d87bdd5b","uid":"b99bc54b-7860-400e-ac77-ef39c2ce62c0","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"client-ca","configMap":{"name":"client-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"kube-api-access-pz4j7","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"route-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655","command":["route-controller-manager","start"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-pz4j7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":10},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000570000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"route-controller-manager-sa","serviceAccount":"route-controller-manager-sa","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c24,c9"},"runAsNonRoot":true,"fsGroup":1000570000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"route-controller-manager","openshift-route-controller-manager-anti-affinity":"true","route-controller-manager":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:49Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:44Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:17Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:17Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:44Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.50","podIPs":[{"ip":"10.128.0.50"}],"startTime":"2026-02-19T03:05:44Z","containerStatuses":[{"name":"route-controller-manager","state":{"running":{"startedAt":"2026-02-19T03:11:16Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-19T03:05:49Z","finishedAt":"2026-02-19T03:11:15Z","containerID":"cri-o://28e9a6d187a12869ec261835ca18a693541d1e5178c38a94171dac51f3ea3706"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655","containerID":"cri-o://30c30ae58bac1ba564b708437a7988f71fa6bcce49d387d7985db2d5834df1d5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-pz4j7","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}controller-manager_current.log0000640000000000000000000006352415145477665034376 0ustar0000000000000000config/pod/openshift-controller-manager/logs/controller-manager-7d4cccb57c-sfb9j2026-02-19T03:11:18.413370976Z I0219 03:11:18.413305 1 shared_informer.go:320] Caches are synced for service account 2026-02-19T03:11:18.415075376Z I0219 03:11:18.414992 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-19T03:11:18.428890120Z I0219 03:11:18.428775 1 shared_informer.go:320] Caches are synced for service account 2026-02-19T03:11:18.432908267Z I0219 03:11:18.432815 1 factory.go:80] Deployer controller caches are synced. Starting workers. 2026-02-19T03:11:18.435755531Z I0219 03:11:18.435670 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-19T03:11:18.512493335Z I0219 03:11:18.512397 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret 2026-02-19T03:11:18.512493335Z I0219 03:11:18.512452 1 legacy_image_pull_secret_controller.go:138] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret" 2026-02-19T03:11:18.512493335Z I0219 03:11:18.512478 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_kids 2026-02-19T03:11:18.512569377Z I0219 03:11:18.512507 1 keyid_observation_controller.go:172] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_kids" 2026-02-19T03:11:18.512569377Z I0219 03:11:18.512550 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_service-account 2026-02-19T03:11:18.512594598Z I0219 03:11:18.512551 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-token-secret 2026-02-19T03:11:18.512620959Z I0219 03:11:18.512578 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_image-pull-secret 2026-02-19T03:11:18.512644959Z I0219 03:11:18.512618 1 legacy_token_secret_controller.go:110] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-token-secret" 2026-02-19T03:11:18.512644959Z I0219 03:11:18.512635 1 image_pull_secret_controller.go:398] Waiting for service account token signing cert to be observed 2026-02-19T03:11:18.512653690Z I0219 03:11:18.512595 1 service_account_controller.go:346] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_service-account" 2026-02-19T03:11:18.512663090Z I0219 03:11:18.512656 1 image_pull_secret_controller.go:384] Waiting for image registry urls to be observed 2026-02-19T03:11:18.512739572Z I0219 03:11:18.512715 1 image_pull_secret_controller.go:401] "Observed service account token signing certs" kids=["441u7csO-z7CvyTLIuPPirsx442vRysBWnIzOMMTbpM"] 2026-02-19T03:11:18.524489846Z I0219 03:11:18.524359 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2026-02-19T03:11:19.354034326Z W0219 03:11:19.353949 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:11:19.354034326Z E0219 03:11:19.353991 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:11:19.691876625Z W0219 03:11:19.691778 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-19T03:11:19.691876625Z E0219 03:11:19.691818 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-19T03:11:19.730979678Z W0219 03:11:19.730442 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-19T03:11:19.730979678Z E0219 03:11:19.730514 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-19T03:11:19.740990951Z W0219 03:11:19.740937 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-19T03:11:19.741035972Z E0219 03:11:19.741013 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-19T03:11:19.774480940Z W0219 03:11:19.774287 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-19T03:11:19.774480940Z E0219 03:11:19.774337 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-19T03:11:19.933592943Z W0219 03:11:19.933340 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-19T03:11:19.933592943Z E0219 03:11:19.933404 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-19T03:11:22.042597180Z W0219 03:11:22.042505 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-19T03:11:22.042597180Z E0219 03:11:22.042572 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-19T03:11:22.313368638Z W0219 03:11:22.313279 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:11:22.313368638Z E0219 03:11:22.313331 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:11:22.419026418Z W0219 03:11:22.418955 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-19T03:11:22.419026418Z E0219 03:11:22.419002 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-19T03:11:22.473725628Z W0219 03:11:22.473553 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-19T03:11:22.473725628Z E0219 03:11:22.473631 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-19T03:11:22.487086259Z W0219 03:11:22.486993 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-19T03:11:22.487086259Z E0219 03:11:22.487052 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-19T03:11:22.683140382Z W0219 03:11:22.683075 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-19T03:11:22.683168063Z E0219 03:11:22.683149 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-19T03:11:25.411540813Z W0219 03:11:25.411426 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-19T03:11:25.411540813Z E0219 03:11:25.411514 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-19T03:11:26.198330652Z W0219 03:11:26.198209 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-19T03:11:26.198330652Z E0219 03:11:26.198271 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-19T03:11:26.533521155Z W0219 03:11:26.533409 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-19T03:11:26.533521155Z E0219 03:11:26.533478 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-19T03:11:26.701205297Z W0219 03:11:26.701152 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-19T03:11:26.701341411Z E0219 03:11:26.701318 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-19T03:11:26.820486666Z W0219 03:11:26.820431 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:11:26.820605999Z E0219 03:11:26.820585 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:11:27.918091525Z W0219 03:11:27.918010 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-19T03:11:27.918091525Z E0219 03:11:27.918060 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-19T03:11:34.371720781Z W0219 03:11:34.371646 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-19T03:11:34.371720781Z E0219 03:11:34.371698 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-19T03:11:34.481227634Z W0219 03:11:34.481125 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-19T03:11:34.481227634Z E0219 03:11:34.481184 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-19T03:11:35.272109123Z W0219 03:11:35.272026 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-19T03:11:35.272109123Z E0219 03:11:35.272089 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-19T03:11:38.072384835Z W0219 03:11:38.072300 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:11:38.072384835Z E0219 03:11:38.072346 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:11:39.308777963Z W0219 03:11:39.308678 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-19T03:11:39.308866566Z E0219 03:11:39.308852 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-19T03:11:40.181225690Z W0219 03:11:40.181152 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-19T03:11:40.181285251Z E0219 03:11:40.181216 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-19T03:11:51.802210131Z W0219 03:11:51.802102 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-19T03:11:51.802210131Z E0219 03:11:51.802173 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-19T03:11:52.624467283Z E0219 03:11:52.624378 1 service_account_controller.go:369] "Unhandled Error" err="assisted-installer/assisted-installer-controller failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:11:52.627477521Z E0219 03:11:52.627433 1 service_account_controller.go:369] "Unhandled Error" err="kube-node-lease/default failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:11:52.627477521Z E0219 03:11:52.627460 1 service_account_controller.go:369] "Unhandled Error" err="assisted-installer/default failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:11:52.628292954Z E0219 03:11:52.627796 1 service_account_controller.go:369] "Unhandled Error" err="kube-public/default failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:11:52.628292954Z E0219 03:11:52.627886 1 service_account_controller.go:369] "Unhandled Error" err="default/default failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:11:53.004730351Z W0219 03:11:53.004654 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:11:53.004730351Z E0219 03:11:53.004712 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:11:53.259777818Z W0219 03:11:53.258458 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-19T03:11:53.259777818Z E0219 03:11:53.258513 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-19T03:11:58.362037265Z W0219 03:11:58.361941 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-19T03:11:58.362037265Z E0219 03:11:58.362013 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-19T03:12:00.165061258Z W0219 03:12:00.165002 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-19T03:12:00.165105559Z E0219 03:12:00.165085 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2026-02-19T03:12:02.976782723Z W0219 03:12:02.976720 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-19T03:12:02.976908327Z E0219 03:12:02.976886 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-19T03:12:26.635543000Z E0219 03:12:26.635438 1 service_account_controller.go:369] "Unhandled Error" err="kube-system/attachdetach-controller failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:12:26.635711385Z E0219 03:12:26.635661 1 service_account_controller.go:369] "Unhandled Error" err="kube-system/clusterrole-aggregation-controller failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:12:26.638731653Z E0219 03:12:26.638582 1 service_account_controller.go:369] "Unhandled Error" err="kube-system/certificate-controller failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:12:26.639339690Z E0219 03:12:26.639209 1 service_account_controller.go:369] "Unhandled Error" err="kube-system/cronjob-controller failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:12:26.639401782Z E0219 03:12:26.639359 1 service_account_controller.go:369] "Unhandled Error" err="kube-system/daemon-set-controller failed with : unable to update managed image pull secret: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:12:35.993716090Z W0219 03:12:35.993675 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2026-02-19T03:12:35.993794742Z E0219 03:12:35.993779 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2026-02-19T03:12:36.679140343Z W0219 03:12:36.679084 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2026-02-19T03:12:36.679190864Z E0219 03:12:36.679167 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2026-02-19T03:12:39.847354386Z W0219 03:12:39.846520 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2026-02-19T03:12:39.847354386Z E0219 03:12:39.846571 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2026-02-19T03:12:43.039036251Z W0219 03:12:43.038955 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:12:43.039036251Z E0219 03:12:43.039021 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:12:45.376638605Z W0219 03:12:45.376527 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2026-02-19T03:12:45.376638605Z E0219 03:12:45.376585 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2026-02-19T03:12:49.057462829Z W0219 03:12:49.057359 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2026-02-19T03:12:49.057462829Z E0219 03:12:49.057408 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" openshift-controller-manager-operator_current.log0000640000000000000000000001021115145477665045522 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-584cc7bcb5-c7c8v2026-02-19T03:11:59.021929204Z I0219 03:11:59.021691 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:11:59.022074809Z I0219 03:11:59.021923 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:11:59.022566963Z I0219 03:11:59.022509 1 observer_polling.go:159] Starting file observer 2026-02-19T03:11:59.038214748Z I0219 03:11:59.038145 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202601302238.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2026-02-19T03:11:59.465835413Z I0219 03:11:59.465466 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:11:59.465912656Z W0219 03:11:59.465898 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:59.465966197Z W0219 03:11:59.465955 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:59.466001818Z W0219 03:11:59.465991 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:11:59.466026269Z W0219 03:11:59.466017 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:11:59.466049080Z W0219 03:11:59.466040 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:11:59.466075370Z W0219 03:11:59.466065 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:11:59.468126420Z I0219 03:11:59.468076 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-19T03:11:59.468520622Z I0219 03:11:59.468495 1 leaderelection.go:254] attempting to acquire leader lease openshift-controller-manager-operator/openshift-controller-manager-operator-lock... 2026-02-19T03:11:59.468637165Z I0219 03:11:59.468614 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-19T03:11:59.468702007Z I0219 03:11:59.468688 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:11:59.468785759Z I0219 03:11:59.468755 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:11:59.468828121Z I0219 03:11:59.468809 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:59.469024636Z I0219 03:11:59.468993 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-19T03:11:59.469059957Z I0219 03:11:59.469039 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:11:59.469133629Z I0219 03:11:59.469104 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:11:59.469252123Z I0219 03:11:59.468826 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:11:59.469252123Z I0219 03:11:59.469242 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:59.569780266Z I0219 03:11:59.569681 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:59.569899000Z I0219 03:11:59.569812 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:59.569899000Z I0219 03:11:59.569877 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController openshift-controller-manager-operator_previous.log0000640000000000000000000000202115145477665045714 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-584cc7bcb5-c7c8v2026-02-19T03:10:26.222406544Z I0219 03:10:26.222108 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:10:26.222406544Z I0219 03:10:26.222372 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:10:26.223037633Z I0219 03:10:26.222981 1 observer_polling.go:159] Starting file observer 2026-02-19T03:10:35.936431519Z I0219 03:10:35.934698 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202601302238.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2026-02-19T03:11:06.258538553Z F0219 03:11:06.257568 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock": context deadline exceeded openshift-controller-manager-operator-584cc7bcb5-c7c8v.json0000640000000000000000000001616115145477665033575 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-584cc7bcb5-c7c8v","generateName":"openshift-controller-manager-operator-584cc7bcb5-","namespace":"openshift-controller-manager-operator","uid":"05c9cb4a-5249-4116-a2e5-caa7859e2075","resourceVersion":"9117","creationTimestamp":"2026-02-19T03:03:31Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"584cc7bcb5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-584cc7bcb5","uid":"95ed93ff-afc4-43ac-a87a-d25b295f6d0e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-qrksf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-qrksf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c5"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:59Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:59Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2026-02-19T03:04:48Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-02-19T03:11:58Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0219 03:10:26.222108 1 cmd.go:253] Using service-serving-cert provided certificates\nI0219 03:10:26.222372 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0219 03:10:26.222981 1 observer_polling.go:159] Starting file observer\nI0219 03:10:35.934698 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202601302238.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0219 03:11:06.257568 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-19T03:10:26Z","finishedAt":"2026-02-19T03:11:06Z","containerID":"cri-o://20eff9a38f665e5f446346726f2e9ae69e64da44d267bdbea6151ec6a1ecbe55"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896","containerID":"cri-o://50aa4a828718a2c8161090508b2a782ad9188b5d56bcad45205b012feb3e3563","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-qrksf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-r7r6p/etcd-operator_current.log0000640000000000000000000001055315145477665031173 0ustar00000000000000002026-02-19T03:11:48.173290001Z I0219 03:11:48.172833 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-02-19T03:11:48.173512158Z I0219 03:11:48.173269 1 observer_polling.go:159] Starting file observer 2026-02-19T03:11:48.173691723Z I0219 03:11:48.173641 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:11:48.173723624Z I0219 03:11:48.173684 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:11:48.174395874Z I0219 03:11:48.174359 1 observer_polling.go:159] Starting file observer 2026-02-19T03:11:48.196117775Z I0219 03:11:48.196033 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601302238.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9 2026-02-19T03:11:48.633963098Z I0219 03:11:48.633855 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:11:48.633963098Z W0219 03:11:48.633920 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:48.633963098Z W0219 03:11:48.633934 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:48.633963098Z W0219 03:11:48.633947 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:11:48.633963098Z W0219 03:11:48.633956 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:11:48.634019610Z W0219 03:11:48.633963 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:11:48.634019610Z W0219 03:11:48.633971 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:11:48.637323456Z I0219 03:11:48.637204 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-19T03:11:48.638220752Z I0219 03:11:48.638147 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-19T03:11:48.638220752Z I0219 03:11:48.638140 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:11:48.638266913Z I0219 03:11:48.638223 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:11:48.638356066Z I0219 03:11:48.638271 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:48.638894052Z I0219 03:11:48.638847 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-02-19T03:11:48.638924793Z I0219 03:11:48.638271 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:11:48.638972884Z I0219 03:11:48.638779 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:48.639187510Z I0219 03:11:48.639116 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:11:48.639275503Z I0219 03:11:48.639221 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-19T03:11:48.639346185Z I0219 03:11:48.639311 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:11:48.740091745Z I0219 03:11:48.739978 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:48.740091745Z I0219 03:11:48.739974 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:48.740155776Z I0219 03:11:48.740002 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController config/pod/openshift-etcd-operator/logs/etcd-operator-545bf96f4d-r7r6p/etcd-operator_previous.log0000640000000000000000000000236315145477665031365 0ustar00000000000000002026-02-19T03:10:36.125135058Z I0219 03:10:36.124934 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:10:36.125291992Z I0219 03:10:36.125099 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:10:36.126297312Z I0219 03:10:36.126265 1 observer_polling.go:159] Starting file observer 2026-02-19T03:10:36.126349193Z I0219 03:10:36.126274 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-02-19T03:10:36.126422415Z I0219 03:10:36.126368 1 observer_polling.go:159] Starting file observer 2026-02-19T03:10:36.142953969Z I0219 03:10:36.142898 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601302238.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9 2026-02-19T03:11:06.662445825Z F0219 03:11:06.661980 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock": context deadline exceeded config/pod/openshift-etcd-operator/etcd-operator-545bf96f4d-r7r6p.json0000640000000000000000000002004115145477665024076 0ustar0000000000000000{"metadata":{"name":"etcd-operator-545bf96f4d-r7r6p","generateName":"etcd-operator-545bf96f4d-","namespace":"openshift-etcd-operator","uid":"4c3267e5-390a-40a3-bff8-1d1d81fb9a17","resourceVersion":"9070","creationTimestamp":"2026-02-19T03:03:33Z","labels":{"app":"etcd-operator","pod-template-hash":"545bf96f4d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.22/23\"],\"mac_address\":\"0a:58:0a:80:00:16\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.22/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.22\"\n ],\n \"mac\": \"0a:58:0a:80:00:16\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-545bf96f4d","uid":"9c80c71a-3b18-4c10-a36e-96eb71c4bc77","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-k6j8c","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.33"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-k6j8c","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:48Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:48Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.22","podIPs":[{"ip":"10.128.0.22"}],"startTime":"2026-02-19T03:04:48Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-02-19T03:11:48Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0219 03:10:36.124934 1 cmd.go:253] Using service-serving-cert provided certificates\nI0219 03:10:36.125099 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0219 03:10:36.126265 1 observer_polling.go:159] Starting file observer\nI0219 03:10:36.126274 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/\nI0219 03:10:36.126368 1 observer_polling.go:159] Starting file observer\nI0219 03:10:36.142898 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601302238.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9\nF0219 03:11:06.661980 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-19T03:10:36Z","finishedAt":"2026-02-19T03:11:06Z","containerID":"cri-o://b74e1ef658deba9054cacd4e4b2f892ff9bc29e9e78ce49be09ab91b8d5e8936"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","containerID":"cri-o://c545cf58bc696341c026f65428a1c9e4ca4d12c0673d4c492e30d1f60df08f53","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-k6j8c","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000003313615145477665033631 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-957b9456f-f5s8c2026-02-19T03:05:40.018957896Z W0219 03:05:40.018824 1 cmd.go:257] Using insecure, self-signed certificates 2026-02-19T03:05:40.019201732Z I0219 03:05:40.019181 1 crypto.go:601] Generating new CA for check-endpoints-signer@1771470340 cert, and key in /tmp/serving-cert-3656613137/serving-signer.crt, /tmp/serving-cert-3656613137/serving-signer.key 2026-02-19T03:05:40.394764295Z I0219 03:05:40.394696 1 observer_polling.go:159] Starting file observer 2026-02-19T03:05:40.418650575Z I0219 03:05:40.418515 1 builder.go:304] check-endpoints version 4.18.0-202601302238.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-19T03:05:40.419446967Z I0219 03:05:40.419407 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-3656613137/tls.crt::/tmp/serving-cert-3656613137/tls.key" 2026-02-19T03:05:40.876650548Z I0219 03:05:40.876592 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-19T03:05:40.881163739Z I0219 03:05:40.879759 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-19T03:05:40.881163739Z I0219 03:05:40.879785 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-19T03:05:40.881163739Z I0219 03:05:40.879850 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-19T03:05:40.881163739Z I0219 03:05:40.879855 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-19T03:05:40.887369846Z I0219 03:05:40.884447 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:05:40.887369846Z W0219 03:05:40.884481 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:05:40.887369846Z W0219 03:05:40.884488 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:05:40.887369846Z W0219 03:05:40.884494 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:05:40.887369846Z W0219 03:05:40.884498 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:05:40.887369846Z W0219 03:05:40.884503 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:05:40.887369846Z W0219 03:05:40.884507 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:05:40.887369846Z I0219 03:05:40.884854 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-19T03:05:40.891523247Z I0219 03:05:40.891471 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-19T03:05:40.891523247Z I0219 03:05:40.891499 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:05:40.891549138Z I0219 03:05:40.891519 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:05:40.891549138Z I0219 03:05:40.891530 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:05:40.891591119Z I0219 03:05:40.891571 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:05:40.891598669Z I0219 03:05:40.891590 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:05:40.891679981Z I0219 03:05:40.891658 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-19T03:05:40.891679981Z I0219 03:05:40.891674 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-19T03:05:40.891769564Z I0219 03:05:40.891747 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3656613137/tls.crt::/tmp/serving-cert-3656613137/tls.key" 2026-02-19T03:05:40.891795044Z I0219 03:05:40.891773 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3656613137/tls.crt::/tmp/serving-cert-3656613137/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771470340\" (2026-02-19 03:05:39 +0000 UTC to 2026-03-21 03:05:40 +0000 UTC (now=2026-02-19 03:05:40.891738493 +0000 UTC))" 2026-02-19T03:05:40.891976469Z I0219 03:05:40.891952 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470340\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470340\" (2026-02-19 02:05:40 +0000 UTC to 2027-02-19 02:05:40 +0000 UTC (now=2026-02-19 03:05:40.891933078 +0000 UTC))" 2026-02-19T03:05:40.891985110Z I0219 03:05:40.891975 1 secure_serving.go:213] Serving securely on [::]:17698 2026-02-19T03:05:40.892011040Z I0219 03:05:40.891998 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-19T03:05:40.892030721Z I0219 03:05:40.892017 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:05:40.893834329Z I0219 03:05:40.893797 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:05:40.893881230Z I0219 03:05:40.893832 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:05:40.894271671Z I0219 03:05:40.894232 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-02-19T03:05:40.894725733Z I0219 03:05:40.894700 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:05:40.992595808Z I0219 03:05:40.992484 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:05:40.992595808Z I0219 03:05:40.992514 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:05:40.992595808Z I0219 03:05:40.992549 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-19T03:05:40.994285903Z I0219 03:05:40.992850 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:48:35 +0000 UTC to 2036-02-17 02:48:35 +0000 UTC (now=2026-02-19 03:05:40.992821734 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.992876 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2026-02-20 02:55:16 +0000 UTC (now=2026-02-19 03:05:40.992866015 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.992892 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:05:40.992880845 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.992904 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:05:40.992896326 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.992916 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2036-02-17 02:55:14 +0000 UTC (now=2026-02-19 03:05:40.992908706 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.993033 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3656613137/tls.crt::/tmp/serving-cert-3656613137/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771470340\" (2026-02-19 03:05:39 +0000 UTC to 2026-03-21 03:05:40 +0000 UTC (now=2026-02-19 03:05:40.993022769 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.993141 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470340\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470340\" (2026-02-19 02:05:40 +0000 UTC to 2027-02-19 02:05:40 +0000 UTC (now=2026-02-19 03:05:40.993117942 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.993220 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:48:35 +0000 UTC to 2036-02-17 02:48:35 +0000 UTC (now=2026-02-19 03:05:40.993210074 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.993232 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2026-02-20 02:55:16 +0000 UTC (now=2026-02-19 03:05:40.993224875 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.993243 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:05:40.993235955 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.993273 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:05:40.993249645 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.993287 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2036-02-17 02:55:14 +0000 UTC (now=2026-02-19 03:05:40.993279996 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.993306 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2026-02-20 02:55:14 +0000 UTC (now=2026-02-19 03:05:40.993299667 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.993399 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3656613137/tls.crt::/tmp/serving-cert-3656613137/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771470340\" (2026-02-19 03:05:39 +0000 UTC to 2026-03-21 03:05:40 +0000 UTC (now=2026-02-19 03:05:40.993390789 +0000 UTC))" 2026-02-19T03:05:40.994285903Z I0219 03:05:40.993489 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470340\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470340\" (2026-02-19 02:05:40 +0000 UTC to 2027-02-19 02:05:40 +0000 UTC (now=2026-02-19 03:05:40.993479601 +0000 UTC))" 2026-02-19T03:05:41.258816118Z I0219 03:05:41.258247 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:05:41.295083540Z I0219 03:05:41.294999 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-02-19T03:05:41.295083540Z I0219 03:05:41.295045 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-957b9456f-f5s8c/openshift-apiserver_current.log0000640000000000000000000011450315145477665030632 0ustar00000000000000002026-02-19T03:12:12.164076273Z E0219 03:12:12.163994 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:12.164132915Z E0219 03:12:12.164073 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:12.164186707Z E0219 03:12:12.164152 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:12.164405403Z E0219 03:12:12.163995 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:12.164563018Z E0219 03:12:12.164001 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.484332625Z E0219 03:12:30.482531 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.484332625Z E0219 03:12:30.482565 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.484332625Z E0219 03:12:30.482569 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.484332625Z E0219 03:12:30.482531 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.484332625Z E0219 03:12:30.482531 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.780597460Z E0219 03:12:30.780534 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.780849638Z E0219 03:12:30.780829 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.781018382Z E0219 03:12:30.780999 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.781183817Z E0219 03:12:30.781165 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.781371753Z E0219 03:12:30.781333 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.800451988Z E0219 03:12:30.800386 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.800495849Z E0219 03:12:30.800449 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.800983743Z E0219 03:12:30.800554 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.803138636Z E0219 03:12:30.803109 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:30.803238709Z E0219 03:12:30.803203 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:31.780044904Z E0219 03:12:31.777630 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:31.780044904Z E0219 03:12:31.777687 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:31.780044904Z E0219 03:12:31.778081 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:31.780044904Z E0219 03:12:31.778140 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:31.780044904Z E0219 03:12:31.778081 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:31.793743262Z E0219 03:12:31.793671 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:31.793811144Z E0219 03:12:31.793780 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:31.793978149Z E0219 03:12:31.793682 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:31.794207376Z E0219 03:12:31.794082 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:31.794207376Z E0219 03:12:31.794089 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:32.062992872Z I0219 03:12:32.062885 1 policy_source.go:224] refreshing policies 2026-02-19T03:12:35.072590713Z I0219 03:12:35.072503 1 policy_source.go:224] refreshing policies 2026-02-19T03:12:36.073560082Z I0219 03:12:36.073496 1 policy_source.go:224] refreshing policies 2026-02-19T03:12:36.087852287Z I0219 03:12:36.087778 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-02-19T03:12:36.089346801Z I0219 03:12:36.089307 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:12:40.189473215Z E0219 03:12:40.189410 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.189523956Z E0219 03:12:40.189479 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.189523956Z E0219 03:12:40.189496 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.189523956Z E0219 03:12:40.189510 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.190290319Z E0219 03:12:40.189562 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.190290319Z E0219 03:12:40.189689 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.190290319Z E0219 03:12:40.189414 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.190290319Z E0219 03:12:40.189729 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.190290319Z E0219 03:12:40.189749 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.190290319Z E0219 03:12:40.189828 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.190290319Z E0219 03:12:40.189410 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.190290319Z E0219 03:12:40.189975 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.190290319Z E0219 03:12:40.189414 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.190290319Z E0219 03:12:40.189999 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.192293927Z E0219 03:12:40.190354 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.195540591Z E0219 03:12:40.195506 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.196287893Z E0219 03:12:40.195607 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.196287893Z E0219 03:12:40.195615 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.196287893Z E0219 03:12:40.195932 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.196287893Z E0219 03:12:40.195948 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.196287893Z E0219 03:12:40.196014 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.196287893Z E0219 03:12:40.196098 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.196287893Z E0219 03:12:40.196142 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.196287893Z E0219 03:12:40.196176 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.196287893Z E0219 03:12:40.196185 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.198295601Z E0219 03:12:40.196323 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.198295601Z E0219 03:12:40.196341 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.198295601Z E0219 03:12:40.196377 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.198295601Z E0219 03:12:40.196429 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.198295601Z E0219 03:12:40.196429 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.206167110Z E0219 03:12:40.206102 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.206410807Z E0219 03:12:40.206388 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.206627704Z E0219 03:12:40.206598 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.206796119Z E0219 03:12:40.206778 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.207520580Z E0219 03:12:40.207480 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.207683604Z E0219 03:12:40.207646 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.207732276Z E0219 03:12:40.207704 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.207954842Z E0219 03:12:40.207918 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.208092256Z E0219 03:12:40.208061 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.208162138Z E0219 03:12:40.208140 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.208329973Z E0219 03:12:40.208307 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.208432456Z E0219 03:12:40.208399 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.208467927Z E0219 03:12:40.208448 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.208592891Z E0219 03:12:40.208544 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.208719305Z E0219 03:12:40.208697 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:41.240288013Z E0219 03:12:41.240209 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:41.240409157Z E0219 03:12:41.240372 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:41.240585192Z E0219 03:12:41.240372 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:41.240650984Z E0219 03:12:41.240631 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:41.240832389Z E0219 03:12:41.240814 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.098228342Z E0219 03:12:42.095627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.098228342Z E0219 03:12:42.095887 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.098228342Z E0219 03:12:42.096007 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.098228342Z E0219 03:12:42.096027 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.098228342Z E0219 03:12:42.096118 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.098228342Z E0219 03:12:42.096236 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.100584080Z E0219 03:12:42.098754 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.100584080Z E0219 03:12:42.099771 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.100584080Z E0219 03:12:42.099869 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.171682058Z E0219 03:12:42.171601 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.171735650Z E0219 03:12:42.171687 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.171735650Z E0219 03:12:42.171697 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.171906235Z E0219 03:12:42.171868 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:42.172051089Z E0219 03:12:42.172010 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:43.106320818Z E0219 03:12:43.106239 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315145477665040455 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-8586dccc9b-mcz8l2026-02-19T03:11:26.034840821Z I0219 03:11:26.034632 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:11:26.034840821Z I0219 03:11:26.034809 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:11:26.035235302Z I0219 03:11:26.035215 1 observer_polling.go:159] Starting file observer 2026-02-19T03:11:26.049473599Z I0219 03:11:26.049412 1 builder.go:304] openshift-apiserver-operator version - 2026-02-19T03:11:26.332916358Z I0219 03:11:26.332834 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:11:26.332916358Z W0219 03:11:26.332872 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:26.332916358Z W0219 03:11:26.332877 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:26.332916358Z W0219 03:11:26.332881 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:11:26.332916358Z W0219 03:11:26.332885 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:11:26.332916358Z W0219 03:11:26.332887 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:11:26.332916358Z W0219 03:11:26.332890 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:11:26.335072921Z I0219 03:11:26.335045 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-19T03:11:26.336959216Z I0219 03:11:26.336897 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... 2026-02-19T03:11:26.337107050Z I0219 03:11:26.337071 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-19T03:11:26.337122921Z I0219 03:11:26.337087 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:11:26.337186593Z I0219 03:11:26.337141 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:11:26.337186593Z I0219 03:11:26.337149 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:11:26.337252895Z I0219 03:11:26.337146 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:26.337296096Z I0219 03:11:26.337242 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:26.337839612Z I0219 03:11:26.337752 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:11:26.338668856Z I0219 03:11:26.338624 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-19T03:11:26.338689027Z I0219 03:11:26.338674 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:11:26.438380932Z I0219 03:11:26.438328 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-19T03:11:26.438529196Z I0219 03:11:26.438388 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:26.438603439Z I0219 03:11:26.438402 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file openshift-apiserver-operator_previous.log0000640000000000000000000000162315145477665040656 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-8586dccc9b-mcz8l2026-02-19T03:10:42.907216216Z I0219 03:10:42.906993 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:10:42.907216216Z I0219 03:10:42.907152 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:10:42.907628718Z I0219 03:10:42.907560 1 observer_polling.go:159] Starting file observer 2026-02-19T03:10:42.923212904Z I0219 03:10:42.923157 1 builder.go:304] openshift-apiserver-operator version - 2026-02-19T03:11:13.306562020Z F0219 03:11:13.306432 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock": context deadline exceeded config/pod/openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-mcz8l.json0000640000000000000000000001605015145477665030377 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-8586dccc9b-mcz8l","generateName":"openshift-apiserver-operator-8586dccc9b-","namespace":"openshift-apiserver-operator","uid":"fbc2f7d0-4bae-4d4a-b041-a624ec2b9333","resourceVersion":"8588","creationTimestamp":"2026-02-19T03:03:32Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"8586dccc9b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.14/23\"],\"mac_address\":\"0a:58:0a:80:00:0e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.14/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.14\"\n ],\n \"mac\": \"0a:58:0a:80:00:0e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-8586dccc9b","uid":"ea0054c7-0706-418c-90ff-4f84fc27b65f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-8p8qd","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.33"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8p8qd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c4"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:26Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:26Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.14","podIPs":[{"ip":"10.128.0.14"}],"startTime":"2026-02-19T03:04:48Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-02-19T03:11:25Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0219 03:10:42.906993 1 cmd.go:253] Using service-serving-cert provided certificates\nI0219 03:10:42.907152 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0219 03:10:42.907560 1 observer_polling.go:159] Starting file observer\nI0219 03:10:42.923157 1 builder.go:304] openshift-apiserver-operator version -\nF0219 03:11:13.306432 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-19T03:10:42Z","finishedAt":"2026-02-19T03:11:13Z","containerID":"cri-o://a5ecaa40749c938a80fde33cdf7954d6eceb84a6560fb8894afe0cf368d43640"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19","containerID":"cri-o://2d9de381b3f8985327172868d95c736182326f4019f8e4ffb8e49b11a18482bb","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-8p8qd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}cluster-olm-operator_current.log0000640000000000000000000001014015145477665035266 0ustar0000000000000000config/pod/openshift-cluster-olm-operator/logs/cluster-olm-operator-5bd7768f54-f8dfs2026-02-19T03:11:05.138036865Z I0219 03:11:05.137751 1 cmd.go:250] Using service-serving-cert provided certificates 2026-02-19T03:11:05.138036865Z I0219 03:11:05.137988 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:11:05.138679094Z I0219 03:11:05.138623 1 observer_polling.go:159] Starting file observer 2026-02-19T03:11:05.160964546Z I0219 03:11:05.160856 1 builder.go:298] cluster-olm-operator version 4.18.0-202601302238.p2.g88088e4.assembly.stream.el9-88088e4-88088e4bfe9f55ea7ab2c4331cebee727c8c0c34 2026-02-19T03:11:15.628137224Z I0219 03:11:15.628052 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:11:15.628137224Z W0219 03:11:15.628114 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:15.628137224Z W0219 03:11:15.628124 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:15.628187905Z W0219 03:11:15.628134 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:11:15.628187905Z W0219 03:11:15.628143 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:11:15.628187905Z W0219 03:11:15.628150 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:11:15.628187905Z W0219 03:11:15.628158 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:11:15.635205961Z I0219 03:11:15.635106 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-19T03:11:15.635363425Z I0219 03:11:15.635300 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-19T03:11:15.635386656Z I0219 03:11:15.635367 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:11:15.635551771Z I0219 03:11:15.635496 1 leaderelection.go:254] attempting to acquire leader lease openshift-cluster-olm-operator/cluster-olm-operator-lock... 2026-02-19T03:11:15.635568221Z I0219 03:11:15.635503 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-19T03:11:15.635603112Z I0219 03:11:15.635587 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:11:15.635743656Z I0219 03:11:15.635696 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:11:15.635754257Z I0219 03:11:15.635740 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:15.635784578Z I0219 03:11:15.635496 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:11:15.635784578Z I0219 03:11:15.635777 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:11:15.635796678Z I0219 03:11:15.635788 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:15.736192614Z I0219 03:11:15.736070 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:15.736192614Z I0219 03:11:15.736158 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:15.736602856Z I0219 03:11:15.736487 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController cluster-olm-operator_previous.log0000640000000000000000000010472615145477665035476 0ustar0000000000000000config/pod/openshift-cluster-olm-operator/logs/cluster-olm-operator-5bd7768f54-f8dfs2026-02-19T03:05:50.694555970Z I0219 03:05:50.694494 1 builder.go:222] "Updating environment" logger="builder" deployment="catalogd-controller-manager" 2026-02-19T03:05:50.697267553Z I0219 03:05:50.697217 1 builder.go:222] "Updating environment" logger="builder" deployment="operator-controller-controller-manager" 2026-02-19T03:05:51.056839527Z I0219 03:05:51.056785 1 builder.go:222] "Updating environment" logger="builder" deployment="catalogd-controller-manager" 2026-02-19T03:05:51.056876598Z I0219 03:05:51.056842 1 builder.go:222] "Updating environment" logger="builder" deployment="operator-controller-controller-manager" 2026-02-19T03:05:51.076270118Z I0219 03:05:51.076205 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.076513014Z I0219 03:05:51.076478 1 dynamicrequiredmanifest_controller.go:172] "olm.operatorframework.io/v1, Resource=clustercatalogs \"/openshift-redhat-marketplace\" does not meet requirements, applying ..." logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.091480776Z I0219 03:05:51.091061 1 dynamicrequiredmanifest_controller.go:173] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.091480776Z I0219 03:05:51.091373 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-02-19T03:05:51.091480776Z I0219 03:05:51.091391 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-02-19T03:05:51.091480776Z I0219 03:05:51.091392 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:51.095523434Z I0219 03:05:51.095469 1 dynamicrequiredmanifest_controller.go:172] "olm.operatorframework.io/v1, Resource=clustercatalogs \"/openshift-community-operators\" does not meet requirements, applying ..." logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-02-19T03:05:51.095560485Z I0219 03:05:51.095528 1 dynamicrequiredmanifest_controller.go:172] "olm.operatorframework.io/v1, Resource=clustercatalogs \"/openshift-certified-operators\" does not meet requirements, applying ..." logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-02-19T03:05:51.095594176Z I0219 03:05:51.095555 1 dynamicrequiredmanifest_controller.go:172] "olm.operatorframework.io/v1, Resource=clustercatalogs \"/openshift-redhat-operators\" does not meet requirements, applying ..." logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:51.107023232Z I0219 03:05:51.106952 1 dynamicrequiredmanifest_controller.go:173] "sync finished" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-02-19T03:05:51.111498543Z I0219 03:05:51.111421 1 dynamicrequiredmanifest_controller.go:173] "sync finished" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-02-19T03:05:51.113195528Z I0219 03:05:51.112986 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.113195528Z I0219 03:05:51.113187 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.114342439Z I0219 03:05:51.114300 1 incompatible_operator_controller.go:65] "sync started" logger="OLMIncompatibleOperatorController" 2026-02-19T03:05:51.114459812Z I0219 03:05:51.114417 1 incompatible_operator_controller.go:101] "sync finished" logger="OLMIncompatibleOperatorController" 2026-02-19T03:05:51.114708729Z I0219 03:05:51.114666 1 dynamicrequiredmanifest_controller.go:173] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:51.115127310Z I0219 03:05:51.115084 1 status_controller.go:225] clusteroperator/olm diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:05:31Z","message":"CatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:40Z","message":"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying::OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:40Z","message":"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\nOperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying::OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:31Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:30Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:05:51.138124757Z I0219 03:05:51.138069 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.138376653Z I0219 03:05:51.138350 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.138714442Z I0219 03:05:51.138687 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-cluster-olm-operator", Name:"cluster-olm-operator", UID:"70098330-0434-419c-ac55-bac09e229ce4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/olm changed: Degraded message changed from "CatalogdClusterCatalogOpenshiftRedhatMarketplaceDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"" to "CatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"" 2026-02-19T03:05:51.144288042Z I0219 03:05:51.144232 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-02-19T03:05:51.144436626Z I0219 03:05:51.144409 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-02-19T03:05:51.145645408Z I0219 03:05:51.145610 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.145698610Z I0219 03:05:51.145666 1 incompatible_operator_controller.go:65] "sync started" logger="OLMIncompatibleOperatorController" 2026-02-19T03:05:51.145786602Z I0219 03:05:51.145767 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.145936456Z I0219 03:05:51.145804 1 incompatible_operator_controller.go:101] "sync finished" logger="OLMIncompatibleOperatorController" 2026-02-19T03:05:51.147115458Z I0219 03:05:51.147084 1 status_controller.go:225] clusteroperator/olm diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:05:31Z","message":"CatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:40Z","message":"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying::OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:40Z","message":"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\nOperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying::OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:31Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:30Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:05:51.161659048Z I0219 03:05:51.161589 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-cluster-olm-operator", Name:"cluster-olm-operator", UID:"70098330-0434-419c-ac55-bac09e229ce4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/olm changed: Degraded message changed from "CatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"" to "CatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"" 2026-02-19T03:05:51.491563195Z I0219 03:05:51.491499 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:51.491712339Z I0219 03:05:51.491687 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:51.491786751Z I0219 03:05:51.491740 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.492020948Z I0219 03:05:51.491997 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.492606873Z I0219 03:05:51.492580 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:51.492647695Z I0219 03:05:51.492624 1 incompatible_operator_controller.go:65] "sync started" logger="OLMIncompatibleOperatorController" 2026-02-19T03:05:51.492711746Z I0219 03:05:51.492692 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:51.492778718Z I0219 03:05:51.492761 1 incompatible_operator_controller.go:101] "sync finished" logger="OLMIncompatibleOperatorController" 2026-02-19T03:05:51.493397425Z I0219 03:05:51.493363 1 status_controller.go:225] clusteroperator/olm diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:05:31Z","message":"CatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:40Z","message":"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying::OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:40Z","message":"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\nOperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying::OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:31Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:30Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:05:51.502315814Z I0219 03:05:51.502241 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-cluster-olm-operator", Name:"cluster-olm-operator", UID:"70098330-0434-419c-ac55-bac09e229ce4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/olm changed: Degraded message changed from "CatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"" to "CatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"" 2026-02-19T03:05:51.692517785Z I0219 03:05:51.692448 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-02-19T03:05:51.692640898Z I0219 03:05:51.692615 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-02-19T03:05:51.694667052Z I0219 03:05:51.694624 1 status_controller.go:225] clusteroperator/olm diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:05:31Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:40Z","message":"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying::OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:40Z","message":"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\nOperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying::OperatorcontrollerDeploymentOperatorControllerControllerManager_Deploying","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:31Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:30Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:05:51.695476434Z I0219 03:05:51.695438 1 incompatible_operator_controller.go:65] "sync started" logger="OLMIncompatibleOperatorController" 2026-02-19T03:05:51.695548756Z I0219 03:05:51.695522 1 incompatible_operator_controller.go:101] "sync finished" logger="OLMIncompatibleOperatorController" 2026-02-19T03:05:51.696054870Z I0219 03:05:51.696019 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.696152782Z I0219 03:05:51.696119 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:51.696665416Z I0219 03:05:51.696623 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:51.696799890Z I0219 03:05:51.696761 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:51.705240116Z I0219 03:05:51.705180 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-cluster-olm-operator", Name:"cluster-olm-operator", UID:"70098330-0434-419c-ac55-bac09e229ce4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/olm changed: Degraded message changed from "CatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \"inject-metadata-name.olm.operatorframework.io\": failed to call webhook: Post \"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\": no endpoints available for service \"catalogd-service\"" to "All is well" 2026-02-19T03:05:51.890879955Z I0219 03:05:51.890805 1 builder.go:222] "Updating environment" logger="builder" deployment="catalogd-controller-manager" 2026-02-19T03:05:52.093686124Z I0219 03:05:52.093638 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-02-19T03:05:52.093820337Z I0219 03:05:52.093800 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-02-19T03:05:52.291633342Z I0219 03:05:52.291572 1 builder.go:222] "Updating environment" logger="builder" deployment="operator-controller-controller-manager" 2026-02-19T03:05:52.490561987Z I0219 03:05:52.490482 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-02-19T03:05:52.490728052Z I0219 03:05:52.490685 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-02-19T03:05:52.592475911Z I0219 03:05:52.592402 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:52.592721197Z I0219 03:05:52.592691 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:54.570584510Z I0219 03:05:54.570475 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-02-19T03:05:54.571008552Z I0219 03:05:54.570968 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-02-19T03:05:54.750651130Z I0219 03:05:54.750577 1 builder.go:222] "Updating environment" logger="builder" deployment="catalogd-controller-manager" 2026-02-19T03:05:55.053804750Z I0219 03:05:55.052354 1 builder.go:222] "Updating environment" logger="builder" deployment="operator-controller-controller-manager" 2026-02-19T03:05:55.673300204Z I0219 03:05:55.670351 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:55.673300204Z I0219 03:05:55.670526 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatMarketplace" 2026-02-19T03:05:55.676919731Z I0219 03:05:55.673421 1 status_controller.go:225] clusteroperator/olm diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:05:31Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:40Z","message":"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:40Z","message":"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:31Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:30Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:05:55.676919731Z I0219 03:05:55.673884 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:55.676919731Z I0219 03:05:55.674092 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftRedhatOperators" 2026-02-19T03:05:55.676919731Z I0219 03:05:55.674929 1 incompatible_operator_controller.go:65] "sync started" logger="OLMIncompatibleOperatorController" 2026-02-19T03:05:55.676919731Z I0219 03:05:55.675019 1 incompatible_operator_controller.go:101] "sync finished" logger="OLMIncompatibleOperatorController" 2026-02-19T03:05:55.681318259Z I0219 03:05:55.680852 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-02-19T03:05:55.681318259Z I0219 03:05:55.681085 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCertifiedOperators" 2026-02-19T03:05:55.686204730Z I0219 03:05:55.685145 1 dynamicrequiredmanifest_controller.go:143] "sync started" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-02-19T03:05:55.686204730Z I0219 03:05:55.685387 1 dynamicrequiredmanifest_controller.go:169] "sync finished" logger="CatalogdClusterCatalogOpenshiftCommunityOperators" 2026-02-19T03:05:55.691020259Z I0219 03:05:55.690952 1 builder.go:222] "Updating environment" logger="builder" deployment="catalogd-controller-manager" 2026-02-19T03:05:55.701569292Z I0219 03:05:55.701354 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-cluster-olm-operator", Name:"cluster-olm-operator", UID:"70098330-0434-419c-ac55-bac09e229ce4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/olm changed: Progressing message changed from "CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods" to "CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods",Available message changed from "CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\nOperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment" to "CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment" 2026-02-19T03:05:55.725496334Z I0219 03:05:55.724579 1 builder.go:222] "Updating environment" logger="builder" deployment="operator-controller-controller-manager" 2026-02-19T03:05:55.784698652Z I0219 03:05:55.784062 1 builder.go:222] "Updating environment" logger="builder" deployment="catalogd-controller-manager" 2026-02-19T03:05:55.809415344Z I0219 03:05:55.809332 1 builder.go:222] "Updating environment" logger="builder" deployment="operator-controller-controller-manager" 2026-02-19T03:05:55.811790408Z I0219 03:05:55.811748 1 builder.go:222] "Updating environment" logger="builder" deployment="catalogd-controller-manager" 2026-02-19T03:05:55.892642127Z I0219 03:05:55.890376 1 builder.go:222] "Updating environment" logger="builder" deployment="operator-controller-controller-manager" 2026-02-19T03:05:56.579975450Z I0219 03:05:56.577842 1 builder.go:222] "Updating environment" logger="builder" deployment="operator-controller-controller-manager" 2026-02-19T03:07:04.337105185Z E0219 03:07:04.336992 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-19T03:07:04.682020337Z W0219 03:07:04.681972 1 base_controller.go:242] Updating status of "CatalogdDeploymentCatalogdControllerManager" failed: unable to ApplyStatus for operator using fieldManager "CatalogdDeploymentCatalogdControllerManager-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:07:04.682020337Z E0219 03:07:04.682008 1 base_controller.go:279] "Unhandled Error" err="CatalogdDeploymentCatalogdControllerManager reconciliation failed: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:08:04.339632664Z E0219 03:08:04.339506 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-olm-operator/cluster-olm-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-olm-operator-lock) 2026-02-19T03:08:14.360648016Z W0219 03:08:14.360522 1 base_controller.go:242] Updating status of "OperatorcontrollerDeploymentOperatorControllerControllerManager" failed: unable to ApplyStatus for operator using fieldManager "OperatorcontrollerDeploymentOperatorControllerControllerManager-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:08:14.360648016Z E0219 03:08:14.360574 1 base_controller.go:279] "Unhandled Error" err="OperatorcontrollerDeploymentOperatorControllerControllerManager reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get olms.operator.openshift.io cluster)" 2026-02-19T03:08:38.688490690Z W0219 03:08:38.688384 1 base_controller.go:242] Updating status of "CatalogdDeploymentCatalogdControllerManager" failed: unable to ApplyStatus for operator using fieldManager "CatalogdDeploymentCatalogdControllerManager-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:08:38.688490690Z E0219 03:08:38.688437 1 base_controller.go:279] "Unhandled Error" err="CatalogdDeploymentCatalogdControllerManager reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get olms.operator.openshift.io cluster)" 2026-02-19T03:09:38.342825450Z E0219 03:09:38.342714 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-19T03:09:48.368392802Z W0219 03:09:48.368299 1 base_controller.go:242] Updating status of "OperatorcontrollerDeploymentOperatorControllerControllerManager" failed: unable to ApplyStatus for operator using fieldManager "OperatorcontrollerDeploymentOperatorControllerControllerManager-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:09:48.368392802Z E0219 03:09:48.368347 1 base_controller.go:279] "Unhandled Error" err="OperatorcontrollerDeploymentOperatorControllerControllerManager reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get olms.operator.openshift.io cluster)" 2026-02-19T03:10:12.696611418Z W0219 03:10:12.696555 1 base_controller.go:242] Updating status of "CatalogdDeploymentCatalogdControllerManager" failed: unable to ApplyStatus for operator using fieldManager "CatalogdDeploymentCatalogdControllerManager-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:10:12.696611418Z E0219 03:10:12.696602 1 base_controller.go:279] "Unhandled Error" err="CatalogdDeploymentCatalogdControllerManager reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get olms.operator.openshift.io cluster)" 2026-02-19T03:10:30.333667467Z E0219 03:10:30.333562 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-olm-operator/cluster-olm-operator-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-cluster-olm-operator/leases/cluster-olm-operator-lock?timeout=4m0s": context deadline exceeded 2026-02-19T03:10:30.333667467Z I0219 03:10:30.333611 1 leaderelection.go:297] failed to renew lease openshift-cluster-olm-operator/cluster-olm-operator-lock: timed out waiting for the condition 2026-02-19T03:11:04.337555846Z E0219 03:11:04.337463 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:11:04.337555846Z W0219 03:11:04.337540 1 leaderelection.go:84] leader election lost config/pod/openshift-cluster-olm-operator/cluster-olm-operator-5bd7768f54-f8dfs.json0000640000000000000000000002243115145477665026736 0ustar0000000000000000{"metadata":{"name":"cluster-olm-operator-5bd7768f54-f8dfs","generateName":"cluster-olm-operator-5bd7768f54-","namespace":"openshift-cluster-olm-operator","uid":"1f9e07d3-d157-4948-84a6-04b8aa7eef4c","resourceVersion":"8102","creationTimestamp":"2026-02-19T03:03:32Z","labels":{"name":"cluster-olm-operator","pod-template-hash":"5bd7768f54"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-olm-operator-5bd7768f54","uid":"eb818160-16f6-4358-89e9-cd8a0cf3d8d9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cluster-olm-operator-serving-cert","secret":{"secretName":"cluster-olm-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"operand-assets","emptyDir":{}},{"name":"kube-api-access-nqt9k","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"copy-catalogd-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/catalogd"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-nqt9k","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000340000,"allowPrivilegeEscalation":false}},{"name":"copy-operator-controller-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/operator-controller"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-nqt9k","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000340000,"allowPrivilegeEscalation":false}}],"containers":[{"name":"cluster-olm-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7","command":["/cluster-olm-operator"],"args":["start"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"OPERATOR_NAME","value":"cluster-olm-operator"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52"},{"name":"CATALOGD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2"},{"name":"OPERATOR_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-nqt9k","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000340000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-olm-operator","serviceAccount":"cluster-olm-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c17"},"runAsNonRoot":true,"fsGroup":1000340000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:26Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:05Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2026-02-19T03:04:48Z","initContainerStatuses":[{"name":"copy-catalogd-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-19T03:05:13Z","finishedAt":"2026-02-19T03:05:13Z","containerID":"cri-o://ad34f3a66db7717f06a16858a5fed120d78982f25b57db7cc0d0805ee1a11f34"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","containerID":"cri-o://ad34f3a66db7717f06a16858a5fed120d78982f25b57db7cc0d0805ee1a11f34","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-nqt9k","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"copy-operator-controller-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-19T03:05:25Z","finishedAt":"2026-02-19T03:05:25Z","containerID":"cri-o://0e04df6594fd15b397e2045ad7c4f04fede6b3d68bd63913e230a0f01929b6ec"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","containerID":"cri-o://0e04df6594fd15b397e2045ad7c4f04fede6b3d68bd63913e230a0f01929b6ec","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-nqt9k","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"cluster-olm-operator","state":{"running":{"startedAt":"2026-02-19T03:11:05Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-19T03:05:29Z","finishedAt":"2026-02-19T03:11:04Z","containerID":"cri-o://b96163b548b39e7368771cc78a7cc93ce0deae1acb7e2556bf2a0d6f06a4eac4"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7","containerID":"cri-o://b3f4a77f73c67cb09a0b1a3711d7b4548b43a8d4dd59d5b931682ba668f229b0","started":true,"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-nqt9k","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy_current.log0000640000000000000000000001620515145477665037467 0ustar0000000000000000config/pod/openshift-operator-controller/logs/operator-controller-controller-manager-9cc7d7bb-s559q2026-02-19T03:05:43.511375798Z I0219 03:05:43.511159 1 flags.go:64] FLAG: --add-dir-header="false" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511305 1 flags.go:64] FLAG: --allow-paths="[]" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511310 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511313 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511317 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511322 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511325 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511328 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511333 1 flags.go:64] FLAG: --client-ca-file="" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511336 1 flags.go:64] FLAG: --config-file="" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511339 1 flags.go:64] FLAG: --help="false" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511341 1 flags.go:64] FLAG: --http2-disable="true" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511345 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511353 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511357 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511360 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511363 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511366 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-02-19T03:05:43.511375798Z I0219 03:05:43.511370 1 flags.go:64] FLAG: --kubeconfig="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511372 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511376 1 flags.go:64] FLAG: --log-dir="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511378 1 flags.go:64] FLAG: --log-file="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511381 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511385 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511388 1 flags.go:64] FLAG: --logtostderr="true" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511391 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511394 1 flags.go:64] FLAG: --oidc-clientID="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511396 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511399 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511402 1 flags.go:64] FLAG: --oidc-issuer="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511405 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511410 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511413 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511416 1 flags.go:64] FLAG: --one-output="false" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511419 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511421 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511424 1 flags.go:64] FLAG: --skip-headers="false" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511427 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511430 1 flags.go:64] FLAG: --stderrthreshold="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511433 1 flags.go:64] FLAG: --tls-cert-file="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511436 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511439 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511442 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511445 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511449 1 flags.go:64] FLAG: --upstream="http://127.0.0.1:8080/" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511452 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511455 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511458 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511461 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511463 1 flags.go:64] FLAG: --v="2" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511466 1 flags.go:64] FLAG: --version="false" 2026-02-19T03:05:43.511558173Z I0219 03:05:43.511470 1 flags.go:64] FLAG: --vmodule="" 2026-02-19T03:05:43.511558173Z W0219 03:05:43.511476 1 options.go:150] 2026-02-19T03:05:43.511558173Z ==== Deprecation Warning ====================== 2026-02-19T03:05:43.511558173Z 2026-02-19T03:05:43.511558173Z Insecure listen address will be removed. 2026-02-19T03:05:43.511558173Z Using --insecure-listen-address won't be possible! 2026-02-19T03:05:43.511558173Z 2026-02-19T03:05:43.511558173Z The ability to run kube-rbac-proxy without TLS certificates will be removed. 2026-02-19T03:05:43.511558173Z Not using --tls-cert-file and --tls-private-key-file won't be possible! 2026-02-19T03:05:43.511558173Z 2026-02-19T03:05:43.511558173Z For more information, please go to https://github.com/brancz/kube-rbac-proxy/issues/187 2026-02-19T03:05:43.511558173Z 2026-02-19T03:05:43.511558173Z =============================================== 2026-02-19T03:05:43.511558173Z 2026-02-19T03:05:43.511558173Z 2026-02-19T03:05:43.511558173Z W0219 03:05:43.511486 1 deprecated.go:66] 2026-02-19T03:05:43.511558173Z ==== Removed Flag Warning ====================== 2026-02-19T03:05:43.511558173Z 2026-02-19T03:05:43.511558173Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-19T03:05:43.511558173Z 2026-02-19T03:05:43.511558173Z =============================================== 2026-02-19T03:05:43.511558173Z 2026-02-19T03:05:43.511927592Z I0219 03:05:43.511886 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-19T03:05:43.513054133Z I0219 03:05:43.513026 1 kube-rbac-proxy.go:331] Generating self signed cert as no cert is provided 2026-02-19T03:05:44.141140457Z I0219 03:05:44.141068 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-19T03:05:44.141466256Z I0219 03:05:44.141433 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 manager_current.log0000640000000000000000000006132415145477665036071 0ustar0000000000000000config/pod/openshift-operator-controller/logs/operator-controller-controller-manager-9cc7d7bb-s559q2026-02-19T03:08:10.522976107Z I0219 03:08:10.522957 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Entrust Root Certification Authority - EC1,OU=See www.entrust.net/legal-terms+OU=(c) 2012 Entrust\\, Inc. - for authorized use only,O=Entrust\\, Inc.,C=US" 2026-02-19T03:08:10.523009018Z I0219 03:08:10.522985 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Entrust Root Certification Authority - G2,OU=See www.entrust.net/legal-terms+OU=(c) 2009 Entrust\\, Inc. - for authorized use only,O=Entrust\\, Inc.,C=US" 2026-02-19T03:08:10.523041119Z I0219 03:08:10.523020 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=FIRMAPROFESIONAL CA ROOT-A WEB,O=Firmaprofesional SA,C=ES,2.5.4.97=#130f56415445532d413632363334303638" 2026-02-19T03:08:10.523069510Z I0219 03:08:10.523047 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GDCA TrustAUTH R5 ROOT,O=GUANG DONG CERTIFICATE AUTHORITY CO.\\,LTD.,C=CN" 2026-02-19T03:08:10.523082461Z I0219 03:08:10.523073 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GLOBALTRUST 2020,O=e-commerce monitoring GmbH,C=AT" 2026-02-19T03:08:10.523110651Z I0219 03:08:10.523093 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GTS Root R1,O=Google Trust Services LLC,C=US" 2026-02-19T03:08:10.523409411Z I0219 03:08:10.523115 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GTS Root R2,O=Google Trust Services LLC,C=US" 2026-02-19T03:08:10.523425871Z I0219 03:08:10.523413 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GTS Root R3,O=Google Trust Services LLC,C=US" 2026-02-19T03:08:10.523438762Z I0219 03:08:10.523431 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GTS Root R4,O=Google Trust Services LLC,C=US" 2026-02-19T03:08:10.523468332Z I0219 03:08:10.523449 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign,OU=GlobalSign ECC Root CA - R4,O=GlobalSign" 2026-02-19T03:08:10.523479773Z I0219 03:08:10.523471 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign,OU=GlobalSign ECC Root CA - R5,O=GlobalSign" 2026-02-19T03:08:10.523508414Z I0219 03:08:10.523490 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign,OU=GlobalSign Root CA - R3,O=GlobalSign" 2026-02-19T03:08:10.523521134Z I0219 03:08:10.523514 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign,OU=GlobalSign Root CA - R6,O=GlobalSign" 2026-02-19T03:08:10.523550405Z I0219 03:08:10.523533 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign Root E46,O=GlobalSign nv-sa,C=BE" 2026-02-19T03:08:10.523563285Z I0219 03:08:10.523555 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=GlobalSign Root R46,O=GlobalSign nv-sa,C=BE" 2026-02-19T03:08:10.523616627Z I0219 03:08:10.523577 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Go Daddy Root Certificate Authority - G2,O=GoDaddy.com\\, Inc.,L=Scottsdale,ST=Arizona,C=US" 2026-02-19T03:08:10.523633538Z I0219 03:08:10.523617 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=HARICA TLS ECC Root CA 2021,O=Hellenic Academic and Research Institutions CA,C=GR" 2026-02-19T03:08:10.523647048Z I0219 03:08:10.523638 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=HARICA TLS RSA Root CA 2021,O=Hellenic Academic and Research Institutions CA,C=GR" 2026-02-19T03:08:10.523679179Z I0219 03:08:10.523660 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Hellenic Academic and Research Institutions ECC RootCA 2015,O=Hellenic Academic and Research Institutions Cert. Authority,L=Athens,C=GR" 2026-02-19T03:08:10.523708030Z I0219 03:08:10.523687 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Hellenic Academic and Research Institutions RootCA 2015,O=Hellenic Academic and Research Institutions Cert. Authority,L=Athens,C=GR" 2026-02-19T03:08:10.523721080Z I0219 03:08:10.523711 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=HiPKI Root CA - G1,O=Chunghwa Telecom Co.\\, Ltd.,C=TW" 2026-02-19T03:08:10.523752511Z I0219 03:08:10.523734 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Hongkong Post Root CA 3,O=Hongkong Post,L=Hong Kong,ST=Hong Kong,C=HK" 2026-02-19T03:08:10.523766112Z I0219 03:08:10.523758 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=ISRG Root X1,O=Internet Security Research Group,C=US" 2026-02-19T03:08:10.523795412Z I0219 03:08:10.523777 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=ISRG Root X2,O=Internet Security Research Group,C=US" 2026-02-19T03:08:10.523808233Z I0219 03:08:10.523800 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=IdenTrust Commercial Root CA 1,O=IdenTrust,C=US" 2026-02-19T03:08:10.523837604Z I0219 03:08:10.523819 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=IdenTrust Public Sector Root CA 1,O=IdenTrust,C=US" 2026-02-19T03:08:10.523851094Z I0219 03:08:10.523844 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Izenpe.com,O=IZENPE S.A.,C=ES" 2026-02-19T03:08:10.523889675Z I0219 03:08:10.523871 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Microsec e-Szigno Root CA 2009,O=Microsec Ltd.,L=Budapest,C=HU,1.2.840.113549.1.9.1=#0c10696e666f40652d737a69676e6f2e6875" 2026-02-19T03:08:10.523916456Z I0219 03:08:10.523896 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Microsoft ECC Root Certificate Authority 2017,O=Microsoft Corporation,C=US" 2026-02-19T03:08:10.523930067Z I0219 03:08:10.523922 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Microsoft RSA Root Certificate Authority 2017,O=Microsoft Corporation,C=US" 2026-02-19T03:08:10.523962988Z I0219 03:08:10.523943 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=NAVER Global Root Certification Authority,O=NAVER BUSINESS PLATFORM Corp.,C=KR" 2026-02-19T03:08:10.523980848Z I0219 03:08:10.523971 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=NetLock Arany (Class Gold) Főtanúsítvány,OU=Tanúsítványkiadók (Certification Services),O=NetLock Kft.,L=Budapest,C=HU" 2026-02-19T03:08:10.524022089Z I0219 03:08:10.523994 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=OISTE WISeKey Global Root GB CA,OU=OISTE Foundation Endorsed,O=WISeKey,C=CH" 2026-02-19T03:08:10.524050080Z I0219 03:08:10.524028 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=OISTE WISeKey Global Root GC CA,OU=OISTE Foundation Endorsed,O=WISeKey,C=CH" 2026-02-19T03:08:10.524060701Z I0219 03:08:10.524052 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 1 G3,O=QuoVadis Limited,C=BM" 2026-02-19T03:08:10.524091042Z I0219 03:08:10.524074 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 2,O=QuoVadis Limited,C=BM" 2026-02-19T03:08:10.524104612Z I0219 03:08:10.524097 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 2 G3,O=QuoVadis Limited,C=BM" 2026-02-19T03:08:10.524138543Z I0219 03:08:10.524121 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 3,O=QuoVadis Limited,C=BM" 2026-02-19T03:08:10.524388901Z I0219 03:08:10.524145 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 3 G3,O=QuoVadis Limited,C=BM" 2026-02-19T03:08:10.524388901Z I0219 03:08:10.524363 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com EV Root Certification Authority ECC,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-02-19T03:08:10.524408791Z I0219 03:08:10.524388 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com EV Root Certification Authority RSA R2,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-02-19T03:08:10.524421302Z I0219 03:08:10.524411 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com Root Certification Authority ECC,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-02-19T03:08:10.524459753Z I0219 03:08:10.524434 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com Root Certification Authority RSA,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-02-19T03:08:10.524459753Z I0219 03:08:10.524453 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com TLS ECC Root CA 2022,O=SSL Corporation,C=US" 2026-02-19T03:08:10.524497764Z I0219 03:08:10.524474 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com TLS RSA Root CA 2022,O=SSL Corporation,C=US" 2026-02-19T03:08:10.524508424Z I0219 03:08:10.524495 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SZAFIR ROOT CA2,O=Krajowa Izba Rozliczeniowa S.A.,C=PL" 2026-02-19T03:08:10.524524595Z I0219 03:08:10.524515 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Sectigo Public Server Authentication Root E46,O=Sectigo Limited,C=GB" 2026-02-19T03:08:10.524578066Z I0219 03:08:10.524554 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Sectigo Public Server Authentication Root R46,O=Sectigo Limited,C=GB" 2026-02-19T03:08:10.524588667Z I0219 03:08:10.524576 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureSign Root CA12,O=Cybertrust Japan Co.\\, Ltd.,C=JP" 2026-02-19T03:08:10.524626718Z I0219 03:08:10.524596 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureSign Root CA14,O=Cybertrust Japan Co.\\, Ltd.,C=JP" 2026-02-19T03:08:10.524626718Z I0219 03:08:10.524619 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureSign Root CA15,O=Cybertrust Japan Co.\\, Ltd.,C=JP" 2026-02-19T03:08:10.524664699Z I0219 03:08:10.524642 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureTrust CA,O=SecureTrust Corporation,C=US" 2026-02-19T03:08:10.524675259Z I0219 03:08:10.524665 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Secure Global CA,O=SecureTrust Corporation,C=US" 2026-02-19T03:08:10.524704110Z I0219 03:08:10.524686 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Security Communication ECC RootCA1,O=SECOM Trust Systems CO.\\,LTD.,C=JP" 2026-02-19T03:08:10.524714721Z I0219 03:08:10.524707 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=Security Communication RootCA2,O=SECOM Trust Systems CO.\\,LTD.,C=JP" 2026-02-19T03:08:10.524756812Z I0219 03:08:10.524733 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Starfield Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US" 2026-02-19T03:08:10.524769832Z I0219 03:08:10.524761 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US" 2026-02-19T03:08:10.524809134Z I0219 03:08:10.524785 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SwissSign Gold CA - G2,O=SwissSign AG,C=CH" 2026-02-19T03:08:10.524819724Z I0219 03:08:10.524810 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SwissSign RSA TLS Root CA 2022 - 1,O=SwissSign AG,C=CH" 2026-02-19T03:08:10.524847825Z I0219 03:08:10.524829 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=T-TeleSec GlobalRoot Class 2,OU=T-Systems Trust Center,O=T-Systems Enterprise Services GmbH,C=DE" 2026-02-19T03:08:10.524860725Z I0219 03:08:10.524851 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=T-TeleSec GlobalRoot Class 3,OU=T-Systems Trust Center,O=T-Systems Enterprise Services GmbH,C=DE" 2026-02-19T03:08:10.524893256Z I0219 03:08:10.524875 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1,OU=Kamu Sertifikasyon Merkezi - Kamu SM,O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK,L=Gebze - Kocaeli,C=TR" 2026-02-19T03:08:10.524906317Z I0219 03:08:10.524898 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TWCA CYBER Root CA,OU=Root CA,O=TAIWAN-CA,C=TW" 2026-02-19T03:08:10.524942658Z I0219 03:08:10.524919 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TWCA Global Root CA,OU=Root CA,O=TAIWAN-CA,C=TW" 2026-02-19T03:08:10.524953188Z I0219 03:08:10.524942 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TWCA Root Certification Authority,OU=Root CA,O=TAIWAN-CA,C=TW" 2026-02-19T03:08:10.524990579Z I0219 03:08:10.524961 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Telekom Security TLS ECC Root 2020,O=Deutsche Telekom Security GmbH,C=DE" 2026-02-19T03:08:10.524990579Z I0219 03:08:10.524985 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Telekom Security TLS RSA Root 2023,O=Deutsche Telekom Security GmbH,C=DE" 2026-02-19T03:08:10.525021770Z I0219 03:08:10.525004 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TeliaSonera Root CA v1,O=TeliaSonera" 2026-02-19T03:08:10.525033270Z I0219 03:08:10.525024 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Telia Root CA v2,O=Telia Finland Oyj,C=FI" 2026-02-19T03:08:10.525062311Z I0219 03:08:10.525044 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia Global Root CA G3,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-02-19T03:08:10.525072862Z I0219 03:08:10.525062 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia Global Root CA G4,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-02-19T03:08:10.525110573Z I0219 03:08:10.525080 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia TLS ECC Root CA,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-02-19T03:08:10.525110573Z I0219 03:08:10.525102 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia TLS RSA Root CA,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-02-19T03:08:10.525149534Z I0219 03:08:10.525126 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Trustwave Global Certification Authority,O=Trustwave Holdings\\, Inc.,L=Chicago,ST=Illinois,C=US" 2026-02-19T03:08:10.525162504Z I0219 03:08:10.525152 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Trustwave Global ECC P256 Certification Authority,O=Trustwave Holdings\\, Inc.,L=Chicago,ST=Illinois,C=US" 2026-02-19T03:08:10.525199086Z I0219 03:08:10.525176 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Trustwave Global ECC P384 Certification Authority,O=Trustwave Holdings\\, Inc.,L=Chicago,ST=Illinois,C=US" 2026-02-19T03:08:10.525213766Z I0219 03:08:10.525201 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TunTrust Root CA,O=Agence Nationale de Certification Electronique,C=TN" 2026-02-19T03:08:10.525227206Z I0219 03:08:10.525220 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=UCA Extended Validation Root,O=UniTrust,C=CN" 2026-02-19T03:08:10.525269168Z I0219 03:08:10.525239 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=UCA Global G2 Root,O=UniTrust,C=CN" 2026-02-19T03:08:10.525295459Z I0219 03:08:10.525282 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=USERTrust ECC Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US" 2026-02-19T03:08:10.525326119Z I0219 03:08:10.525308 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US" 2026-02-19T03:08:10.525336650Z I0219 03:08:10.525329 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=certSIGN ROOT CA,O=certSIGN,C=RO" 2026-02-19T03:08:10.525366551Z I0219 03:08:10.525348 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=certSIGN ROOT CA G2,O=CERTSIGN SA,C=RO" 2026-02-19T03:08:10.525397302Z I0219 03:08:10.525378 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=e-Szigno Root CA 2017,O=Microsec Ltd.,L=Budapest,C=HU,2.5.4.97=#130e56415448552d3233353834343937" 2026-02-19T03:08:10.525410432Z I0219 03:08:10.525403 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=ePKI Root Certification Authority,O=Chunghwa Telecom Co.\\, Ltd.,C=TW" 2026-02-19T03:08:10.525441373Z I0219 03:08:10.525423 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign ECC Root CA - C3,OU=emSign PKI,O=eMudhra Inc,C=US" 2026-02-19T03:08:10.525454383Z I0219 03:08:10.525446 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign ECC Root CA - G3,OU=emSign PKI,O=eMudhra Technologies Limited,C=IN" 2026-02-19T03:08:10.525482544Z I0219 03:08:10.525465 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign Root CA - C1,OU=emSign PKI,O=eMudhra Inc,C=US" 2026-02-19T03:08:10.525496045Z I0219 03:08:10.525488 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign Root CA - G1,OU=emSign PKI,O=eMudhra Technologies Limited,C=IN" 2026-02-19T03:08:10.525524906Z I0219 03:08:10.525507 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=vTrus ECC Root CA,O=iTrusChina Co.\\,Ltd.,C=CN" 2026-02-19T03:08:10.525537766Z I0219 03:08:10.525530 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=vTrus Root CA,O=iTrusChina Co.\\,Ltd.,C=CN" 2026-02-19T03:08:10.525594698Z I0219 03:08:10.525576 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="service-ca.crt" subject="CN=openshift-service-serving-signer@1771470301" 2026-02-19T03:08:10.525794024Z I0219 03:08:10.525743 1 main.go:336] "creating SecretSyncer controller for watching secret" logger="setup" Secret="openshift-config/pull-secret" 2026-02-19T03:08:10.525794024Z I0219 03:08:10.525769 1 main.go:359] "starting manager" logger="setup" 2026-02-19T03:08:10.526014051Z I0219 03:08:10.525966 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-02-19T03:08:10.526077443Z I0219 03:08:10.526046 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-02-19T03:08:10.526116414Z I0219 03:08:10.526075 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress="127.0.0.1:8080" secure=false 2026-02-19T03:08:10.526277289Z I0219 03:08:10.526236 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-controller/9c4404e7.operatorframework.io... 2026-02-19T03:09:10.529669608Z E0219 03:09:10.529572 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io) 2026-02-19T03:11:01.101170199Z E0219 03:11:01.101052 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io) manager_previous.log0000640000000000000000000006114515145477665036264 0ustar0000000000000000config/pod/openshift-operator-controller/logs/operator-controller-controller-manager-9cc7d7bb-s559q2026-02-19T03:05:43.325454951Z I0219 03:05:43.325439 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=NAVER Global Root Certification Authority,O=NAVER BUSINESS PLATFORM Corp.,C=KR" 2026-02-19T03:05:43.325483392Z I0219 03:05:43.325465 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=NetLock Arany (Class Gold) Főtanúsítvány,OU=Tanúsítványkiadók (Certification Services),O=NetLock Kft.,L=Budapest,C=HU" 2026-02-19T03:05:43.325506843Z I0219 03:05:43.325490 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=OISTE WISeKey Global Root GB CA,OU=OISTE Foundation Endorsed,O=WISeKey,C=CH" 2026-02-19T03:05:43.325530323Z I0219 03:05:43.325514 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=OISTE WISeKey Global Root GC CA,OU=OISTE Foundation Endorsed,O=WISeKey,C=CH" 2026-02-19T03:05:43.325552754Z I0219 03:05:43.325537 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 1 G3,O=QuoVadis Limited,C=BM" 2026-02-19T03:05:43.325578955Z I0219 03:05:43.325560 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 2,O=QuoVadis Limited,C=BM" 2026-02-19T03:05:43.325593385Z I0219 03:05:43.325582 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 2 G3,O=QuoVadis Limited,C=BM" 2026-02-19T03:05:43.325620686Z I0219 03:05:43.325605 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 3,O=QuoVadis Limited,C=BM" 2026-02-19T03:05:43.325644017Z I0219 03:05:43.325628 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=QuoVadis Root CA 3 G3,O=QuoVadis Limited,C=BM" 2026-02-19T03:05:43.325669327Z I0219 03:05:43.325653 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com EV Root Certification Authority ECC,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-02-19T03:05:43.325696388Z I0219 03:05:43.325680 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com EV Root Certification Authority RSA R2,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-02-19T03:05:43.325721879Z I0219 03:05:43.325705 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com Root Certification Authority ECC,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-02-19T03:05:43.325938884Z I0219 03:05:43.325909 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com Root Certification Authority RSA,O=SSL Corporation,L=Houston,ST=Texas,C=US" 2026-02-19T03:05:43.325938884Z I0219 03:05:43.325934 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com TLS ECC Root CA 2022,O=SSL Corporation,C=US" 2026-02-19T03:05:43.325968445Z I0219 03:05:43.325954 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SSL.com TLS RSA Root CA 2022,O=SSL Corporation,C=US" 2026-02-19T03:05:43.325988446Z I0219 03:05:43.325975 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SZAFIR ROOT CA2,O=Krajowa Izba Rozliczeniowa S.A.,C=PL" 2026-02-19T03:05:43.326011196Z I0219 03:05:43.325996 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Sectigo Public Server Authentication Root E46,O=Sectigo Limited,C=GB" 2026-02-19T03:05:43.326033257Z I0219 03:05:43.326019 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Sectigo Public Server Authentication Root R46,O=Sectigo Limited,C=GB" 2026-02-19T03:05:43.326052678Z I0219 03:05:43.326039 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureSign Root CA12,O=Cybertrust Japan Co.\\, Ltd.,C=JP" 2026-02-19T03:05:43.326074718Z I0219 03:05:43.326061 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureSign Root CA14,O=Cybertrust Japan Co.\\, Ltd.,C=JP" 2026-02-19T03:05:43.326094599Z I0219 03:05:43.326080 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureSign Root CA15,O=Cybertrust Japan Co.\\, Ltd.,C=JP" 2026-02-19T03:05:43.326116879Z I0219 03:05:43.326103 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SecureTrust CA,O=SecureTrust Corporation,C=US" 2026-02-19T03:05:43.326138390Z I0219 03:05:43.326125 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Secure Global CA,O=SecureTrust Corporation,C=US" 2026-02-19T03:05:43.326159090Z I0219 03:05:43.326145 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Security Communication ECC RootCA1,O=SECOM Trust Systems CO.\\,LTD.,C=JP" 2026-02-19T03:05:43.326182481Z I0219 03:05:43.326168 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=Security Communication RootCA2,O=SECOM Trust Systems CO.\\,LTD.,C=JP" 2026-02-19T03:05:43.326210012Z I0219 03:05:43.326193 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Starfield Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US" 2026-02-19T03:05:43.326235622Z I0219 03:05:43.326218 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Starfield Services Root Certificate Authority - G2,O=Starfield Technologies\\, Inc.,L=Scottsdale,ST=Arizona,C=US" 2026-02-19T03:05:43.326296324Z I0219 03:05:43.326242 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SwissSign Gold CA - G2,O=SwissSign AG,C=CH" 2026-02-19T03:05:43.326296324Z I0219 03:05:43.326287 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=SwissSign RSA TLS Root CA 2022 - 1,O=SwissSign AG,C=CH" 2026-02-19T03:05:43.326318025Z I0219 03:05:43.326307 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=T-TeleSec GlobalRoot Class 2,OU=T-Systems Trust Center,O=T-Systems Enterprise Services GmbH,C=DE" 2026-02-19T03:05:43.326341965Z I0219 03:05:43.326327 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=T-TeleSec GlobalRoot Class 3,OU=T-Systems Trust Center,O=T-Systems Enterprise Services GmbH,C=DE" 2026-02-19T03:05:43.326369106Z I0219 03:05:43.326354 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1,OU=Kamu Sertifikasyon Merkezi - Kamu SM,O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK,L=Gebze - Kocaeli,C=TR" 2026-02-19T03:05:43.326393647Z I0219 03:05:43.326379 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TWCA CYBER Root CA,OU=Root CA,O=TAIWAN-CA,C=TW" 2026-02-19T03:05:43.326415447Z I0219 03:05:43.326401 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TWCA Global Root CA,OU=Root CA,O=TAIWAN-CA,C=TW" 2026-02-19T03:05:43.326435798Z I0219 03:05:43.326422 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TWCA Root Certification Authority,OU=Root CA,O=TAIWAN-CA,C=TW" 2026-02-19T03:05:43.326457298Z I0219 03:05:43.326443 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Telekom Security TLS ECC Root 2020,O=Deutsche Telekom Security GmbH,C=DE" 2026-02-19T03:05:43.326479669Z I0219 03:05:43.326466 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Telekom Security TLS RSA Root 2023,O=Deutsche Telekom Security GmbH,C=DE" 2026-02-19T03:05:43.326498109Z I0219 03:05:43.326485 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TeliaSonera Root CA v1,O=TeliaSonera" 2026-02-19T03:05:43.326526100Z I0219 03:05:43.326512 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Telia Root CA v2,O=Telia Finland Oyj,C=FI" 2026-02-19T03:05:43.326547431Z I0219 03:05:43.326533 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia Global Root CA G3,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-02-19T03:05:43.326568181Z I0219 03:05:43.326554 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia Global Root CA G4,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-02-19T03:05:43.326591612Z I0219 03:05:43.326577 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia TLS ECC Root CA,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-02-19T03:05:43.326612853Z I0219 03:05:43.326599 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TrustAsia TLS RSA Root CA,O=TrustAsia Technologies\\, Inc.,C=CN" 2026-02-19T03:05:43.326641033Z I0219 03:05:43.326627 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Trustwave Global Certification Authority,O=Trustwave Holdings\\, Inc.,L=Chicago,ST=Illinois,C=US" 2026-02-19T03:05:43.326664854Z I0219 03:05:43.326650 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Trustwave Global ECC P256 Certification Authority,O=Trustwave Holdings\\, Inc.,L=Chicago,ST=Illinois,C=US" 2026-02-19T03:05:43.326689265Z I0219 03:05:43.326674 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=Trustwave Global ECC P384 Certification Authority,O=Trustwave Holdings\\, Inc.,L=Chicago,ST=Illinois,C=US" 2026-02-19T03:05:43.326712035Z I0219 03:05:43.326697 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=TunTrust Root CA,O=Agence Nationale de Certification Electronique,C=TN" 2026-02-19T03:05:43.326733576Z I0219 03:05:43.326719 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=UCA Extended Validation Root,O=UniTrust,C=CN" 2026-02-19T03:05:43.326754356Z I0219 03:05:43.326740 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=UCA Global G2 Root,O=UniTrust,C=CN" 2026-02-19T03:05:43.326778897Z I0219 03:05:43.326765 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=USERTrust ECC Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US" 2026-02-19T03:05:43.326805108Z I0219 03:05:43.326791 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=US" 2026-02-19T03:05:43.326827008Z I0219 03:05:43.326809 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=certSIGN ROOT CA,O=certSIGN,C=RO" 2026-02-19T03:05:43.326849059Z I0219 03:05:43.326832 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=certSIGN ROOT CA G2,O=CERTSIGN SA,C=RO" 2026-02-19T03:05:43.326873140Z I0219 03:05:43.326856 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=e-Szigno Root CA 2017,O=Microsec Ltd.,L=Budapest,C=HU,2.5.4.97=#130e56415448552d3233353834343937" 2026-02-19T03:05:43.326900660Z I0219 03:05:43.326880 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="OU=ePKI Root Certification Authority,O=Chunghwa Telecom Co.\\, Ltd.,C=TW" 2026-02-19T03:05:43.326908350Z I0219 03:05:43.326902 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign ECC Root CA - C3,OU=emSign PKI,O=eMudhra Inc,C=US" 2026-02-19T03:05:43.326935161Z I0219 03:05:43.326920 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign ECC Root CA - G3,OU=emSign PKI,O=eMudhra Technologies Limited,C=IN" 2026-02-19T03:05:43.326955152Z I0219 03:05:43.326941 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign Root CA - C1,OU=emSign PKI,O=eMudhra Inc,C=US" 2026-02-19T03:05:43.326975672Z I0219 03:05:43.326962 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=emSign Root CA - G1,OU=emSign PKI,O=eMudhra Technologies Limited,C=IN" 2026-02-19T03:05:43.326995783Z I0219 03:05:43.326982 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=vTrus ECC Root CA,O=iTrusChina Co.\\,Ltd.,C=CN" 2026-02-19T03:05:43.327016363Z I0219 03:05:43.327003 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="ca-bundle.crt" subject="CN=vTrus Root CA,O=iTrusChina Co.\\,Ltd.,C=CN" 2026-02-19T03:05:43.327077825Z I0219 03:05:43.327051 1 certlog.go:81] "watching certificate directory" logger="cert-pool" directory="/var/ca-certs" file="service-ca.crt" subject="CN=openshift-service-serving-signer@1771470301" 2026-02-19T03:05:43.327409574Z I0219 03:05:43.327387 1 main.go:336] "creating SecretSyncer controller for watching secret" logger="setup" Secret="openshift-config/pull-secret" 2026-02-19T03:05:43.327423364Z I0219 03:05:43.327411 1 main.go:359] "starting manager" logger="setup" 2026-02-19T03:05:43.327715042Z I0219 03:05:43.327674 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-02-19T03:05:43.327798574Z I0219 03:05:43.327761 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-02-19T03:05:43.327879577Z I0219 03:05:43.327837 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress="127.0.0.1:8080" secure=false 2026-02-19T03:05:43.327967569Z I0219 03:05:43.327939 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-controller/9c4404e7.operatorframework.io... 2026-02-19T03:05:43.336987251Z I0219 03:05:43.336839 1 leaderelection.go:268] successfully acquired lease openshift-operator-controller/9c4404e7.operatorframework.io 2026-02-19T03:05:43.337515565Z I0219 03:05:43.337200 1 controller.go:175] "Starting EventSource" controller="clusterextension" controllerGroup="olm.operatorframework.io" controllerKind="ClusterExtension" source="kind source: *v1.ClusterExtension" 2026-02-19T03:05:43.337515565Z I0219 03:05:43.337223 1 controller.go:175] "Starting EventSource" controller="clusterextension" controllerGroup="olm.operatorframework.io" controllerKind="ClusterExtension" source="kind source: *v1.ClusterCatalog" 2026-02-19T03:05:43.337515565Z I0219 03:05:43.337231 1 controller.go:183] "Starting Controller" controller="clusterextension" controllerGroup="olm.operatorframework.io" controllerKind="ClusterExtension" 2026-02-19T03:05:43.337911085Z I0219 03:05:43.337886 1 controller.go:175] "Starting EventSource" controller="secret" controllerGroup="" controllerKind="Secret" source="kind source: *v1.Secret" 2026-02-19T03:05:43.337911085Z I0219 03:05:43.337903 1 controller.go:183] "Starting Controller" controller="secret" controllerGroup="" controllerKind="Secret" 2026-02-19T03:05:43.338133521Z I0219 03:05:43.338088 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-19T03:05:43.338133521Z I0219 03:05:43.338105 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-19T03:05:43.338325437Z I0219 03:05:43.338300 1 controller.go:175] "Starting EventSource" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" source="kind source: *v1.ClusterCatalog" 2026-02-19T03:05:43.338325437Z I0219 03:05:43.338316 1 controller.go:183] "Starting Controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" 2026-02-19T03:05:43.339893789Z I0219 03:05:43.339859 1 reflector.go:368] Caches populated for *v1.Secret from pkg/cache/internal/informers.go:106 2026-02-19T03:05:43.339912039Z I0219 03:05:43.339886 1 reflector.go:368] Caches populated for *v1.ClusterCatalog from pkg/cache/internal/informers.go:106 2026-02-19T03:05:43.340778782Z I0219 03:05:43.340745 1 reflector.go:368] Caches populated for *v1.ClusterExtension from pkg/cache/internal/informers.go:106 2026-02-19T03:05:43.439114160Z I0219 03:05:43.439009 1 controller.go:217] "Starting workers" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" worker count=1 2026-02-19T03:05:43.439144870Z I0219 03:05:43.439086 1 controller.go:217] "Starting workers" controller="clusterextension" controllerGroup="olm.operatorframework.io" controllerKind="ClusterExtension" worker count=1 2026-02-19T03:05:43.439144870Z I0219 03:05:43.439124 1 controller.go:217] "Starting workers" controller="secret" controllerGroup="" controllerKind="Secret" worker count=1 2026-02-19T03:05:43.440434455Z I0219 03:05:43.440392 1 pull_secret_controller.go:94] "saved global pull secret data locally" controller="secret" controllerGroup="" controllerKind="Secret" Secret="openshift-config/pull-secret" namespace="openshift-config" name="pull-secret" reconcileID="fe72097e-a8c2-4c95-ad79-d24a6dbddc62" 2026-02-19T03:05:51.091536507Z I0219 03:05:51.091441 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="4b32c9dc-f4dd-42ac-ba40-bdd40a7348f2" 2026-02-19T03:05:51.091577928Z I0219 03:05:51.091529 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="4b32c9dc-f4dd-42ac-ba40-bdd40a7348f2" 2026-02-19T03:05:51.095909694Z I0219 03:05:51.095855 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from pkg/cache/internal/informers.go:106 2026-02-19T03:05:51.098562856Z I0219 03:05:51.098503 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="2ace23c3-f4d7-4efc-8d02-cb9489a9efc3" 2026-02-19T03:05:51.098562856Z I0219 03:05:51.098549 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="2ace23c3-f4d7-4efc-8d02-cb9489a9efc3" 2026-02-19T03:05:51.107028893Z I0219 03:05:51.106958 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="e07c0189-bf88-462a-8f59-b540d6e066ac" 2026-02-19T03:05:51.107028893Z I0219 03:05:51.107010 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="e07c0189-bf88-462a-8f59-b540d6e066ac" 2026-02-19T03:05:51.111218165Z I0219 03:05:51.110882 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="4a6386b7-c7b1-48cb-9273-28ea87e79d8d" 2026-02-19T03:05:51.111218165Z I0219 03:05:51.110952 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="4a6386b7-c7b1-48cb-9273-28ea87e79d8d" 2026-02-19T03:05:51.114072542Z I0219 03:05:51.114027 1 clustercatalog_controller.go:54] "reconcile starting" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="868c1430-7d8d-4600-89e0-8c724a668ae1" 2026-02-19T03:05:51.114110513Z I0219 03:05:51.114070 1 clustercatalog_controller.go:75] "reconcile ending" logger="cluster-catalog" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="868c1430-7d8d-4600-89e0-8c724a668ae1" 2026-02-19T03:06:43.364380705Z E0219 03:06:43.364286 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-19T03:07:43.366789584Z E0219 03:07:43.366689 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io) 2026-02-19T03:07:56.361092347Z I0219 03:07:56.360959 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition 2026-02-19T03:07:56.361174530Z E0219 03:07:56.361101 1 main.go:362] "problem running manager" err="leader election lost" logger="setup" config/pod/openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-s559q.json0000640000000000000000000002473415145477665032224 0ustar0000000000000000{"metadata":{"name":"operator-controller-controller-manager-9cc7d7bb-s559q","generateName":"operator-controller-controller-manager-9cc7d7bb-","namespace":"openshift-operator-controller","uid":"8f7d8fc8-c313-416f-b62b-b54db9944066","resourceVersion":"7758","creationTimestamp":"2026-02-19T03:05:40Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"9cc7d7bb"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.45/23\"],\"mac_address\":\"0a:58:0a:80:00:2d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.45/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.45\"\n ],\n \"mac\": \"0a:58:0a:80:00:2d\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-9cc7d7bb","uid":"a04bd907-f6ac-4af7-b267-0f4227d135db","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-9dkxh","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-9dkxh","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-9dkxh","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:43Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:40Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:10:25Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:10:25Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:40Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.45","podIPs":[{"ip":"10.128.0.45"}],"startTime":"2026-02-19T03:05:40Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-19T03:05:43Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://26d440572b09c4ca16fc7c4bf03dae16d65fb0b4990f333d824255de7f8cc6d0","started":true,"volumeMounts":[{"name":"kube-api-access-9dkxh","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-19T03:08:10Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"4a6386b7-c7b1-48cb-9273-28ea87e79d8d\"\nI0219 03:05:51.110952 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"4a6386b7-c7b1-48cb-9273-28ea87e79d8d\"\nI0219 03:05:51.114027 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"868c1430-7d8d-4600-89e0-8c724a668ae1\"\nI0219 03:05:51.114070 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"868c1430-7d8d-4600-89e0-8c724a668ae1\"\nE0219 03:06:43.364286 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0219 03:07:43.366689 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0219 03:07:56.360959 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0219 03:07:56.361101 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-02-19T03:05:43Z","finishedAt":"2026-02-19T03:07:56Z","containerID":"cri-o://63e9da7bba52316e4ecf529d81e030bb4b7c5317fbd6fe3da25ae598ba0cf3f5"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","containerID":"cri-o://027172ba4dcd10cd3e3177cc36691683dffc4cdf627b8d23cdb2d10cafe015ef","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-9dkxh","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/logs/catalogd-controller-manager-84b8d9d697-jhj9q/manager_current.log0000640000000000000000000000476415145477665031650 0ustar00000000000000002026-02-19T03:09:52.559591422Z I0219 03:09:52.559520 1 certwatcher.go:161] "Updated current TLS certificate" logger="controller-runtime.certwatcher" 2026-02-19T03:09:52.568312978Z I0219 03:09:52.568229 1 main.go:303] "creating SecretSyncer controller for watching secret" logger="setup" Secret="openshift-config/pull-secret" 2026-02-19T03:09:52.568610046Z I0219 03:09:52.568528 1 webhook.go:163] "Registering a mutating webhook" logger="controller-runtime.builder" GVK="olm.operatorframework.io/v1, Kind=ClusterCatalog" path="/mutate-olm-operatorframework-io-v1-clustercatalog" 2026-02-19T03:09:52.568680888Z I0219 03:09:52.568658 1 server.go:183] "Registering webhook" logger="controller-runtime.webhook" path="/mutate-olm-operatorframework-io-v1-clustercatalog" 2026-02-19T03:09:52.568691769Z I0219 03:09:52.568674 1 webhook.go:225] "skip registering a validating webhook, object does not implement admission.Validator or WithValidator wasn't called" logger="controller-runtime.builder" GVK="olm.operatorframework.io/v1, Kind=ClusterCatalog" 2026-02-19T03:09:52.568777641Z I0219 03:09:52.568745 1 main.go:349] "starting mutating webhook manager" logger="setup" 2026-02-19T03:09:52.568861064Z I0219 03:09:52.568842 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-02-19T03:09:52.568908345Z I0219 03:09:52.568892 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-02-19T03:09:52.568955726Z I0219 03:09:52.568925 1 server.go:191] "Starting webhook server" logger="controller-runtime.webhook" 2026-02-19T03:09:52.568982627Z I0219 03:09:52.568947 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress="127.0.0.1:8080" secure=false 2026-02-19T03:09:52.569063150Z I0219 03:09:52.569017 1 server.go:242] "Serving webhook server" logger="controller-runtime.webhook" host="" port=9443 2026-02-19T03:09:52.569130872Z I0219 03:09:52.569107 1 server.go:96] "starting server" kind="catalogs" addr="[::]:8443" 2026-02-19T03:09:52.569198554Z I0219 03:09:52.569179 1 leaderelection.go:254] attempting to acquire leader lease openshift-catalogd/catalogd-operator-lock... 2026-02-19T03:10:52.571486901Z E0219 03:10:52.571397 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock) kube-rbac-proxy_current.log0000640000000000000000000001620515145477665033162 0ustar0000000000000000config/pod/openshift-catalogd/logs/catalogd-controller-manager-84b8d9d697-jhj9q2026-02-19T03:05:41.670409496Z I0219 03:05:41.670229 1 flags.go:64] FLAG: --add-dir-header="false" 2026-02-19T03:05:41.670409496Z I0219 03:05:41.670367 1 flags.go:64] FLAG: --allow-paths="[]" 2026-02-19T03:05:41.670409496Z I0219 03:05:41.670374 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-02-19T03:05:41.670409496Z I0219 03:05:41.670377 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-02-19T03:05:41.670409496Z I0219 03:05:41.670381 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-02-19T03:05:41.670409496Z I0219 03:05:41.670385 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-02-19T03:05:41.670409496Z I0219 03:05:41.670388 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-02-19T03:05:41.670409496Z I0219 03:05:41.670391 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-02-19T03:05:41.670409496Z I0219 03:05:41.670394 1 flags.go:64] FLAG: --client-ca-file="" 2026-02-19T03:05:41.670409496Z I0219 03:05:41.670397 1 flags.go:64] FLAG: --config-file="" 2026-02-19T03:05:41.670409496Z I0219 03:05:41.670400 1 flags.go:64] FLAG: --help="false" 2026-02-19T03:05:41.670409496Z I0219 03:05:41.670402 1 flags.go:64] FLAG: --http2-disable="true" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670412 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670420 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670423 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670428 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670430 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670434 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670438 1 flags.go:64] FLAG: --kubeconfig="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670441 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670443 1 flags.go:64] FLAG: --log-dir="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670446 1 flags.go:64] FLAG: --log-file="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670449 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670452 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670456 1 flags.go:64] FLAG: --logtostderr="true" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670459 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670462 1 flags.go:64] FLAG: --oidc-clientID="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670464 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670467 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670470 1 flags.go:64] FLAG: --oidc-issuer="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670473 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670478 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670480 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670483 1 flags.go:64] FLAG: --one-output="false" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670486 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670489 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:7443" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670492 1 flags.go:64] FLAG: --skip-headers="false" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670495 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670498 1 flags.go:64] FLAG: --stderrthreshold="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670500 1 flags.go:64] FLAG: --tls-cert-file="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670503 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670507 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670510 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670513 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670517 1 flags.go:64] FLAG: --upstream="http://127.0.0.1:8080/" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670520 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670522 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670525 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670529 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-02-19T03:05:41.670536979Z I0219 03:05:41.670532 1 flags.go:64] FLAG: --v="2" 2026-02-19T03:05:41.670563740Z I0219 03:05:41.670535 1 flags.go:64] FLAG: --version="false" 2026-02-19T03:05:41.670563740Z I0219 03:05:41.670539 1 flags.go:64] FLAG: --vmodule="" 2026-02-19T03:05:41.670563740Z W0219 03:05:41.670549 1 options.go:150] 2026-02-19T03:05:41.670563740Z ==== Deprecation Warning ====================== 2026-02-19T03:05:41.670563740Z 2026-02-19T03:05:41.670563740Z Insecure listen address will be removed. 2026-02-19T03:05:41.670563740Z Using --insecure-listen-address won't be possible! 2026-02-19T03:05:41.670563740Z 2026-02-19T03:05:41.670563740Z The ability to run kube-rbac-proxy without TLS certificates will be removed. 2026-02-19T03:05:41.670563740Z Not using --tls-cert-file and --tls-private-key-file won't be possible! 2026-02-19T03:05:41.670563740Z 2026-02-19T03:05:41.670563740Z For more information, please go to https://github.com/brancz/kube-rbac-proxy/issues/187 2026-02-19T03:05:41.670563740Z 2026-02-19T03:05:41.670563740Z =============================================== 2026-02-19T03:05:41.670563740Z 2026-02-19T03:05:41.670563740Z 2026-02-19T03:05:41.670563740Z W0219 03:05:41.670559 1 deprecated.go:66] 2026-02-19T03:05:41.670563740Z ==== Removed Flag Warning ====================== 2026-02-19T03:05:41.670563740Z 2026-02-19T03:05:41.670563740Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-19T03:05:41.670563740Z 2026-02-19T03:05:41.670563740Z =============================================== 2026-02-19T03:05:41.670563740Z 2026-02-19T03:05:41.671175406Z I0219 03:05:41.671149 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-19T03:05:41.672084791Z I0219 03:05:41.672061 1 kube-rbac-proxy.go:331] Generating self signed cert as no cert is provided 2026-02-19T03:05:41.947050405Z I0219 03:05:41.946980 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:7443 2026-02-19T03:05:41.947395504Z I0219 03:05:41.947367 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:7443 config/pod/openshift-catalogd/logs/catalogd-controller-manager-84b8d9d697-jhj9q/manager_previous.log0000640000000000000000000005376215145477665032044 0ustar00000000000000002026-02-19T03:05:41.896967222Z I0219 03:05:41.896901 1 certwatcher.go:161] "Updated current TLS certificate" logger="controller-runtime.certwatcher" 2026-02-19T03:05:41.920873613Z I0219 03:05:41.920811 1 main.go:303] "creating SecretSyncer controller for watching secret" logger="setup" Secret="openshift-config/pull-secret" 2026-02-19T03:05:41.926806552Z I0219 03:05:41.926737 1 webhook.go:163] "Registering a mutating webhook" logger="controller-runtime.builder" GVK="olm.operatorframework.io/v1, Kind=ClusterCatalog" path="/mutate-olm-operatorframework-io-v1-clustercatalog" 2026-02-19T03:05:41.926894875Z I0219 03:05:41.926872 1 server.go:183] "Registering webhook" logger="controller-runtime.webhook" path="/mutate-olm-operatorframework-io-v1-clustercatalog" 2026-02-19T03:05:41.926894875Z I0219 03:05:41.926886 1 webhook.go:225] "skip registering a validating webhook, object does not implement admission.Validator or WithValidator wasn't called" logger="controller-runtime.builder" GVK="olm.operatorframework.io/v1, Kind=ClusterCatalog" 2026-02-19T03:05:41.926943646Z I0219 03:05:41.926925 1 main.go:349] "starting mutating webhook manager" logger="setup" 2026-02-19T03:05:41.927003898Z I0219 03:05:41.926985 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-02-19T03:05:41.927182072Z I0219 03:05:41.927154 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress="127.0.0.1:8080" secure=false 2026-02-19T03:05:41.927329736Z I0219 03:05:41.927293 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-02-19T03:05:41.927415129Z I0219 03:05:41.927389 1 server.go:191] "Starting webhook server" logger="controller-runtime.webhook" 2026-02-19T03:05:41.927570033Z I0219 03:05:41.927533 1 server.go:96] "starting server" kind="catalogs" addr="[::]:8443" 2026-02-19T03:05:41.927635584Z I0219 03:05:41.927620 1 leaderelection.go:254] attempting to acquire leader lease openshift-catalogd/catalogd-operator-lock... 2026-02-19T03:05:41.928009115Z I0219 03:05:41.927588 1 server.go:242] "Serving webhook server" logger="controller-runtime.webhook" host="" port=9443 2026-02-19T03:05:41.938456485Z I0219 03:05:41.938409 1 leaderelection.go:268] successfully acquired lease openshift-catalogd/catalogd-operator-lock 2026-02-19T03:05:41.938681831Z I0219 03:05:41.938653 1 certwatcher.go:115] "Starting certificate watcher" logger="controller-runtime.certwatcher" 2026-02-19T03:05:41.938734492Z I0219 03:05:41.938707 1 controller.go:175] "Starting EventSource" controller="secret" controllerGroup="" controllerKind="Secret" source="kind source: *v1.Secret" 2026-02-19T03:05:41.938744992Z I0219 03:05:41.938731 1 controller.go:183] "Starting Controller" controller="secret" controllerGroup="" controllerKind="Secret" 2026-02-19T03:05:41.938796734Z I0219 03:05:41.938750 1 controller.go:175] "Starting EventSource" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" source="kind source: *v1.ClusterCatalog" 2026-02-19T03:05:41.938796734Z I0219 03:05:41.938789 1 controller.go:183] "Starting Controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" 2026-02-19T03:05:41.938929587Z I0219 03:05:41.938902 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-19T03:05:41.938929587Z I0219 03:05:41.938924 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-19T03:05:41.942452432Z I0219 03:05:41.940825 1 reflector.go:368] Caches populated for *v1.Secret from pkg/cache/internal/informers.go:106 2026-02-19T03:05:41.942452432Z I0219 03:05:41.941669 1 reflector.go:368] Caches populated for *v1.ClusterCatalog from pkg/cache/internal/informers.go:106 2026-02-19T03:05:42.040344757Z I0219 03:05:42.039815 1 controller.go:217] "Starting workers" controller="secret" controllerGroup="" controllerKind="Secret" worker count=1 2026-02-19T03:05:42.040382848Z I0219 03:05:42.040324 1 pull_secret_controller.go:94] "saved global pull secret data locally" controller="secret" controllerGroup="" controllerKind="Secret" Secret="openshift-config/pull-secret" namespace="openshift-config" name="pull-secret" reconcileID="8f5e18b9-99fd-4e52-bb20-9389b5eb841d" 2026-02-19T03:05:42.041187440Z I0219 03:05:42.041069 1 controller.go:217] "Starting workers" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" worker count=1 2026-02-19T03:05:51.083945133Z I0219 03:05:51.083704 1 cluster_catalog_webhook.go:24] "Invoking Default method for ClusterCatalog" logger="admission" webhookGroup="olm.operatorframework.io" webhookKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" resource={"group":"olm.operatorframework.io","version":"v1","resource":"clustercatalogs"} user="system:serviceaccount:openshift-cluster-olm-operator:cluster-olm-operator" requestID="f84d99e2-866d-44a1-b498-a3d99083fc96" object={"kind":"ClusterCatalog","apiVersion":"olm.operatorframework.io/v1","metadata":{"name":"openshift-redhat-marketplace","creationTimestamp":null,"managedFields":[{"manager":"CatalogdClusterCatalogOpenshiftRedhatMarketplace","operation":"Apply","apiVersion":"olm.operatorframework.io/v1","time":"2026-02-19T03:05:51Z","fieldsType":"FieldsV1","fieldsV1":{"f:spec":{"f:priority":{},"f:source":{"f:image":{"f:pollIntervalMinutes":{},"f:ref":{}},"f:type":{}}}}}]},"spec":{"source":{"type":"Image","image":{"ref":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","pollIntervalMinutes":10}},"priority":-300,"availabilityMode":"Available"},"status":{}} 2026-02-19T03:05:51.083945133Z I0219 03:05:51.083898 1 cluster_catalog_webhook.go:35] "default" logger="admission" webhookGroup="olm.operatorframework.io" webhookKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" resource={"group":"olm.operatorframework.io","version":"v1","resource":"clustercatalogs"} user="system:serviceaccount:openshift-cluster-olm-operator:cluster-olm-operator" requestID="f84d99e2-866d-44a1-b498-a3d99083fc96" olm.operatorframework.io/metadata.name="openshift-redhat-marketplace" labels={"olm.operatorframework.io/metadata.name":"openshift-redhat-marketplace"} 2026-02-19T03:05:51.091148097Z I0219 03:05:51.091088 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="6f4c4d66-8cc6-4e02-8ece-ad1013ee5e69" 2026-02-19T03:05:51.100437686Z I0219 03:05:51.099194 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="6f4c4d66-8cc6-4e02-8ece-ad1013ee5e69" 2026-02-19T03:05:51.100437686Z I0219 03:05:51.099284 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" 2026-02-19T03:05:51.100437686Z I0219 03:05:51.099314 1 clustercatalog_controller.go:208] "unpack required: no cached catalog metadata found for this catalog" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" 2026-02-19T03:05:51.100437686Z I0219 03:05:51.099369 1 main.go:250] "using available authentication information for pulling image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" 2026-02-19T03:05:51.100877478Z I0219 03:05:51.100801 1 cluster_catalog_webhook.go:24] "Invoking Default method for ClusterCatalog" logger="admission" webhookGroup="olm.operatorframework.io" webhookKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" resource={"group":"olm.operatorframework.io","version":"v1","resource":"clustercatalogs"} user="system:serviceaccount:openshift-cluster-olm-operator:cluster-olm-operator" requestID="6b54bc99-c0e7-49b9-9ff9-2e5f486124e3" object={"kind":"ClusterCatalog","apiVersion":"olm.operatorframework.io/v1","metadata":{"name":"openshift-certified-operators","creationTimestamp":null,"managedFields":[{"manager":"CatalogdClusterCatalogOpenshiftCertifiedOperators","operation":"Apply","apiVersion":"olm.operatorframework.io/v1","time":"2026-02-19T03:05:51Z","fieldsType":"FieldsV1","fieldsV1":{"f:spec":{"f:priority":{},"f:source":{"f:image":{"f:pollIntervalMinutes":{},"f:ref":{}},"f:type":{}}}}}]},"spec":{"source":{"type":"Image","image":{"ref":"registry.redhat.io/redhat/certified-operator-index:v4.18","pollIntervalMinutes":10}},"priority":-200,"availabilityMode":"Available"},"status":{}} 2026-02-19T03:05:51.100877478Z I0219 03:05:51.100859 1 cluster_catalog_webhook.go:35] "default" logger="admission" webhookGroup="olm.operatorframework.io" webhookKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" resource={"group":"olm.operatorframework.io","version":"v1","resource":"clustercatalogs"} user="system:serviceaccount:openshift-cluster-olm-operator:cluster-olm-operator" requestID="6b54bc99-c0e7-49b9-9ff9-2e5f486124e3" olm.operatorframework.io/metadata.name="openshift-certified-operators" labels={"olm.operatorframework.io/metadata.name":"openshift-certified-operators"} 2026-02-19T03:05:51.103938860Z I0219 03:05:51.103849 1 cluster_catalog_webhook.go:24] "Invoking Default method for ClusterCatalog" logger="admission" webhookGroup="olm.operatorframework.io" webhookKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" resource={"group":"olm.operatorframework.io","version":"v1","resource":"clustercatalogs"} user="system:serviceaccount:openshift-cluster-olm-operator:cluster-olm-operator" requestID="ac40bea8-aa5a-49f5-83cc-bfdfd0240c09" object={"kind":"ClusterCatalog","apiVersion":"olm.operatorframework.io/v1","metadata":{"name":"openshift-community-operators","creationTimestamp":null,"managedFields":[{"manager":"CatalogdClusterCatalogOpenshiftCommunityOperators","operation":"Apply","apiVersion":"olm.operatorframework.io/v1","time":"2026-02-19T03:05:51Z","fieldsType":"FieldsV1","fieldsV1":{"f:spec":{"f:priority":{},"f:source":{"f:image":{"f:pollIntervalMinutes":{},"f:ref":{}},"f:type":{}}}}}]},"spec":{"source":{"type":"Image","image":{"ref":"registry.redhat.io/redhat/community-operator-index:v4.18","pollIntervalMinutes":10}},"priority":-400,"availabilityMode":"Available"},"status":{}} 2026-02-19T03:05:51.103938860Z I0219 03:05:51.103917 1 cluster_catalog_webhook.go:35] "default" logger="admission" webhookGroup="olm.operatorframework.io" webhookKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" resource={"group":"olm.operatorframework.io","version":"v1","resource":"clustercatalogs"} user="system:serviceaccount:openshift-cluster-olm-operator:cluster-olm-operator" requestID="ac40bea8-aa5a-49f5-83cc-bfdfd0240c09" olm.operatorframework.io/metadata.name="openshift-community-operators" labels={"olm.operatorframework.io/metadata.name":"openshift-community-operators"} 2026-02-19T03:05:51.107296250Z I0219 03:05:51.106998 1 cluster_catalog_webhook.go:24] "Invoking Default method for ClusterCatalog" logger="admission" webhookGroup="olm.operatorframework.io" webhookKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" resource={"group":"olm.operatorframework.io","version":"v1","resource":"clustercatalogs"} user="system:serviceaccount:openshift-cluster-olm-operator:cluster-olm-operator" requestID="c46d1572-f766-4b7f-963e-43dc79c6cca3" object={"kind":"ClusterCatalog","apiVersion":"olm.operatorframework.io/v1","metadata":{"name":"openshift-redhat-operators","creationTimestamp":null,"managedFields":[{"manager":"CatalogdClusterCatalogOpenshiftRedhatOperators","operation":"Apply","apiVersion":"olm.operatorframework.io/v1","time":"2026-02-19T03:05:51Z","fieldsType":"FieldsV1","fieldsV1":{"f:spec":{"f:priority":{},"f:source":{"f:image":{"f:pollIntervalMinutes":{},"f:ref":{}},"f:type":{}}}}}]},"spec":{"source":{"type":"Image","image":{"ref":"registry.redhat.io/redhat/redhat-operator-index:v4.18","pollIntervalMinutes":10}},"priority":-100,"availabilityMode":"Available"},"status":{}} 2026-02-19T03:05:51.107296250Z I0219 03:05:51.107070 1 cluster_catalog_webhook.go:35] "default" logger="admission" webhookGroup="olm.operatorframework.io" webhookKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" resource={"group":"olm.operatorframework.io","version":"v1","resource":"clustercatalogs"} user="system:serviceaccount:openshift-cluster-olm-operator:cluster-olm-operator" requestID="c46d1572-f766-4b7f-963e-43dc79c6cca3" olm.operatorframework.io/metadata.name="openshift-redhat-operators" labels={"olm.operatorframework.io/metadata.name":"openshift-redhat-operators"} 2026-02-19T03:05:58.329471259Z I0219 03:05:58.329398 1 containers_image.go:147] "pulled image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" ref="registry.redhat.io/redhat/redhat-marketplace-index:v4.18" digest="sha256:b3293b04e31c8e67c885f77e0ad2ee994295afde7c42cb9761c7090ae0cdb3f8" 2026-02-19T03:05:58.330581988Z I0219 03:05:58.330549 1 containers_image.go:299] "unpacking image" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" path="/var/cache/unpack/openshift-redhat-marketplace/sha256:b3293b04e31c8e67c885f77e0ad2ee994295afde7c42cb9761c7090ae0cdb3f8" 2026-02-19T03:05:59.778968282Z I0219 03:05:59.778825 1 containers_image.go:311] "applied layer" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" layer=0 2026-02-19T03:06:00.689806720Z I0219 03:06:00.689696 1 containers_image.go:311] "applied layer" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" layer=1 2026-02-19T03:06:00.849945944Z I0219 03:06:00.849861 1 containers_image.go:311] "applied layer" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" layer=2 2026-02-19T03:06:03.362836637Z I0219 03:06:03.362661 1 containers_image.go:311] "applied layer" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" layer=3 2026-02-19T03:06:04.460947406Z I0219 03:06:04.460827 1 containers_image.go:311] "applied layer" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" layer=4 2026-02-19T03:06:38.957307658Z I0219 03:06:38.957168 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" 2026-02-19T03:06:38.957307658Z I0219 03:06:38.957247 1 controller.go:314] "Warning: Reconciler returned both a non-zero result and a non-nil error. The result will always be ignored if the error is non-nil and the non-nil error causes reqeueuing with exponential backoff. For more details, see: https://pkg.go.dev/sigs.k8s.io/controller-runtime/pkg/reconcile#Reconciler" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" 2026-02-19T03:06:38.957370110Z E0219 03:06:38.957300 1 controller.go:316] "Reconciler error" err="error updating status: Timeout: request did not complete within requested timeout - context deadline exceeded" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-marketplace" namespace="" name="openshift-redhat-marketplace" reconcileID="7575982e-3eb7-4f86-a9ba-bd51b085ad1a" 2026-02-19T03:06:38.957370110Z I0219 03:06:38.957352 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="bf3401c4-9486-4936-8200-262a4bf40ae6" 2026-02-19T03:06:41.949133366Z E0219 03:06:41.949010 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-19T03:07:12.960757566Z I0219 03:07:12.960629 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="bf3401c4-9486-4936-8200-262a4bf40ae6" 2026-02-19T03:07:12.960757566Z E0219 03:07:12.960689 1 controller.go:316] "Reconciler error" err="error updating finalizers: Timeout: request did not complete within requested timeout - context deadline exceeded" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-certified-operators" namespace="" name="openshift-certified-operators" reconcileID="bf3401c4-9486-4936-8200-262a4bf40ae6" 2026-02-19T03:07:12.960757566Z I0219 03:07:12.960722 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="ee5edfad-dd8e-4924-8dcb-fea44ad49200" 2026-02-19T03:07:41.950738000Z E0219 03:07:41.950660 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock) 2026-02-19T03:07:46.965179262Z I0219 03:07:46.964930 1 clustercatalog_controller.go:134] "reconcile ending" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="ee5edfad-dd8e-4924-8dcb-fea44ad49200" 2026-02-19T03:07:46.965179262Z E0219 03:07:46.965034 1 controller.go:316] "Reconciler error" err="error updating finalizers: Timeout: request did not complete within requested timeout - context deadline exceeded" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-community-operators" namespace="" name="openshift-community-operators" reconcileID="ee5edfad-dd8e-4924-8dcb-fea44ad49200" 2026-02-19T03:07:46.965179262Z I0219 03:07:46.965126 1 clustercatalog_controller.go:86] "reconcile starting" logger="catalogd-controller" controller="clustercatalog" controllerGroup="olm.operatorframework.io" controllerKind="ClusterCatalog" ClusterCatalog="openshift-redhat-operators" namespace="" name="openshift-redhat-operators" reconcileID="ec40cc3b-9461-4abd-ba47-a25d5e55c2b0" 2026-02-19T03:07:54.946608662Z I0219 03:07:54.946501 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition 2026-02-19T03:07:54.946679635Z E0219 03:07:54.946603 1 main.go:351] "problem running manager" err="leader election lost" logger="setup" 2026-02-19T03:07:54.946679635Z I0219 03:07:54.946654 1 internal.go:538] "Stopping and waiting for non leader election runnables" config/pod/openshift-catalogd/catalogd-controller-manager-84b8d9d697-jhj9q.json0000640000000000000000000002537115145477665025715 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-84b8d9d697-jhj9q","generateName":"catalogd-controller-manager-84b8d9d697-","namespace":"openshift-catalogd","uid":"7012676e-f35d-46e5-83e8-a63172dd076e","resourceVersion":"7774","creationTimestamp":"2026-02-19T03:05:40Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"84b8d9d697"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.44/23\"],\"mac_address\":\"0a:58:0a:80:00:2c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.44/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.44\"\n ],\n \"mac\": \"0a:58:0a:80:00:2c\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-84b8d9d697","uid":"cca31b87-e544-4513-a67f-f2f570240e63","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-lm2wm","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-lm2wm","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-lm2wm","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:40Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:10:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:10:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:40Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.44","podIPs":[{"ip":"10.128.0.44"}],"startTime":"2026-02-19T03:05:40Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-19T03:05:41Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://b653d15e9a094fb6f27e9f1174c70b153d2193bac59f07f3285a73537a189385","started":true,"volumeMounts":[{"name":"kube-api-access-lm2wm","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-19T03:09:52Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"atalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"ee5edfad-dd8e-4924-8dcb-fea44ad49200\"\nE0219 03:07:41.950660 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0219 03:07:46.964930 1 clustercatalog_controller.go:134] \"reconcile ending\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"ee5edfad-dd8e-4924-8dcb-fea44ad49200\"\nE0219 03:07:46.965034 1 controller.go:316] \"Reconciler error\" err=\"error updating finalizers: Timeout: request did not complete within requested timeout - context deadline exceeded\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"ee5edfad-dd8e-4924-8dcb-fea44ad49200\"\nI0219 03:07:46.965126 1 clustercatalog_controller.go:86] \"reconcile starting\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"ec40cc3b-9461-4abd-ba47-a25d5e55c2b0\"\nI0219 03:07:54.946501 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0219 03:07:54.946603 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\nI0219 03:07:54.946654 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\n","startedAt":"2026-02-19T03:05:41Z","finishedAt":"2026-02-19T03:07:54Z","containerID":"cri-o://63378086041fcb0de956f1a5a160faad6c0e85b100c25eacbce569a26a79079c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","containerID":"cri-o://85c05765f6dadb3299427fcae734f7bc6d46d71d6d24a21ddaf8cbc81b5c9220","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-lm2wm","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515145477665042746 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-77cd4d9559-w5pp82026-02-19T03:11:31.201136748Z I0219 03:11:31.200919 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:11:31.201136748Z I0219 03:11:31.201029 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:11:31.201429337Z I0219 03:11:31.201378 1 observer_polling.go:159] Starting file observer 2026-02-19T03:11:31.216388224Z I0219 03:11:31.216324 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601302238.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31 2026-02-19T03:11:31.502630655Z I0219 03:11:31.502538 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:11:31.502630655Z W0219 03:11:31.502594 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:31.502630655Z W0219 03:11:31.502604 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:31.502630655Z W0219 03:11:31.502612 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:11:31.502630655Z W0219 03:11:31.502619 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:11:31.502675897Z W0219 03:11:31.502625 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:11:31.502675897Z W0219 03:11:31.502632 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:11:31.505020235Z I0219 03:11:31.504979 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-19T03:11:31.505493469Z I0219 03:11:31.505472 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-02-19T03:11:31.508108556Z I0219 03:11:31.507869 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-19T03:11:31.508108556Z I0219 03:11:31.507943 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:11:31.508108556Z I0219 03:11:31.508005 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:11:31.508108556Z I0219 03:11:31.508036 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:31.508108556Z I0219 03:11:31.508051 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:11:31.508108556Z I0219 03:11:31.508059 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:31.508757285Z I0219 03:11:31.508719 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:11:31.510670191Z I0219 03:11:31.510613 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-19T03:11:31.510777364Z I0219 03:11:31.510729 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:11:31.608450080Z I0219 03:11:31.608341 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-19T03:11:31.608450080Z I0219 03:11:31.608377 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:31.608506292Z I0219 03:11:31.608347 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file kube-scheduler-operator-container_previous.log0000640000000000000000000000202515145477665043140 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-77cd4d9559-w5pp82026-02-19T03:09:52.533166430Z I0219 03:09:52.532999 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:09:52.533166430Z I0219 03:09:52.533125 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:09:52.533751517Z I0219 03:09:52.533714 1 observer_polling.go:159] Starting file observer 2026-02-19T03:10:35.936334486Z I0219 03:10:35.933688 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601302238.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31 2026-02-19T03:11:06.413181086Z F0219 03:11:06.413062 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock": context deadline exceeded config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-w5pp8.json0000640000000000000000000001547315145477665032007 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-77cd4d9559-w5pp8","generateName":"openshift-kube-scheduler-operator-77cd4d9559-","namespace":"openshift-kube-scheduler-operator","uid":"5301cbc9-b3f3-4b2d-a114-1ba0752462f1","resourceVersion":"8608","creationTimestamp":"2026-02-19T03:03:31Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"77cd4d9559"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-77cd4d9559","uid":"5153c26f-9a3c-497f-a712-7198be6d3c8a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:31Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:31Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-02-19T03:04:48Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-02-19T03:11:31Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0219 03:09:52.532999 1 cmd.go:253] Using service-serving-cert provided certificates\nI0219 03:09:52.533125 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0219 03:09:52.533714 1 observer_polling.go:159] Starting file observer\nI0219 03:10:35.933688 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601302238.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31\nF0219 03:11:06.413062 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-19T03:09:52Z","finishedAt":"2026-02-19T03:11:06Z","containerID":"cri-o://d0d44f45186dc14ce0bc7dc97e190ce8663cf19d313b3812b2eeb67bbc3b7464"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","containerID":"cri-o://884bbb0c6a080e3a39941119b143247d39406ba0108a748fdc28ca8ad12d533d","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-4-master-0/installer_current.log0000640000000000000000000001722215145477665027210 0ustar00000000000000002026-02-19T03:10:30.385785841Z I0219 03:10:30.385303 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000485720 cert-secrets:0xc000484d20 configmaps:0xc0004840a0 namespace:0xc000467b80 optional-configmaps:0xc000484320 optional-secrets:0xc0004841e0 pod:0xc000467cc0 pod-manifest-dir:0xc0004845a0 resource-dir:0xc000484460 revision:0xc000467a40 secrets:0xc000467e00 v:0xc0000f3900] [0xc0000f3900 0xc000467a40 0xc000467b80 0xc000467cc0 0xc000484460 0xc0004845a0 0xc0004840a0 0xc000484320 0xc0004841e0 0xc000467e00 0xc000485720 0xc000484d20] [] map[cert-configmaps:0xc000484dc0 cert-dir:0xc000485720 cert-secrets:0xc000484d20 configmaps:0xc0004840a0 help:0xc0005b60a0 kubeconfig:0xc0004677c0 log-flush-frequency:0xc0000f37c0 namespace:0xc000467b80 optional-cert-configmaps:0xc000485680 optional-cert-secrets:0xc000485540 optional-configmaps:0xc000484320 optional-secrets:0xc0004841e0 pod:0xc000467cc0 pod-manifest-dir:0xc0004845a0 pod-manifests-lock-file:0xc000484820 resource-dir:0xc000484460 revision:0xc000467a40 secrets:0xc000467e00 timeout-duration:0xc0004846e0 v:0xc0000f3900 vmodule:0xc0000f3a40] [0xc0004677c0 0xc000467a40 0xc000467b80 0xc000467cc0 0xc000467e00 0xc0004840a0 0xc0004841e0 0xc000484320 0xc000484460 0xc0004845a0 0xc0004846e0 0xc000484820 0xc000484d20 0xc000484dc0 0xc000485540 0xc000485680 0xc000485720 0xc0000f37c0 0xc0000f3900 0xc0000f3a40 0xc0005b60a0] [0xc000484dc0 0xc000485720 0xc000484d20 0xc0004840a0 0xc0005b60a0 0xc0004677c0 0xc0000f37c0 0xc000467b80 0xc000485680 0xc000485540 0xc000484320 0xc0004841e0 0xc000467cc0 0xc0004845a0 0xc000484820 0xc000484460 0xc000467a40 0xc000467e00 0xc0004846e0 0xc0000f3900 0xc0000f3a40] map[104:0xc0005b60a0 118:0xc0000f3900] [] -1 0 0xc00034b3e0 true 0x223d5a0 []} 2026-02-19T03:10:30.385785841Z I0219 03:10:30.385580 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0002eeb60)({ 2026-02-19T03:10:30.385785841Z KubeConfig: (string) "", 2026-02-19T03:10:30.385785841Z KubeClient: (kubernetes.Interface) , 2026-02-19T03:10:30.385785841Z Revision: (string) (len=1) "4", 2026-02-19T03:10:30.385785841Z NodeName: (string) "", 2026-02-19T03:10:30.385785841Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-02-19T03:10:30.385785841Z Clock: (clock.RealClock) { 2026-02-19T03:10:30.385785841Z }, 2026-02-19T03:10:30.385785841Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-02-19T03:10:30.385785841Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-19T03:10:30.385785841Z (string) (len=31) "localhost-recovery-client-token" 2026-02-19T03:10:30.385785841Z }, 2026-02-19T03:10:30.385785841Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-19T03:10:30.385785841Z (string) (len=12) "serving-cert" 2026-02-19T03:10:30.385785841Z }, 2026-02-19T03:10:30.385785841Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-02-19T03:10:30.385785841Z (string) (len=18) "kube-scheduler-pod", 2026-02-19T03:10:30.385785841Z (string) (len=6) "config", 2026-02-19T03:10:30.385785841Z (string) (len=17) "serviceaccount-ca", 2026-02-19T03:10:30.385785841Z (string) (len=20) "scheduler-kubeconfig", 2026-02-19T03:10:30.385785841Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-02-19T03:10:30.385785841Z }, 2026-02-19T03:10:30.385785841Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-19T03:10:30.385785841Z (string) (len=16) "policy-configmap" 2026-02-19T03:10:30.385785841Z }, 2026-02-19T03:10:30.385785841Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-02-19T03:10:30.385785841Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-02-19T03:10:30.385785841Z }, 2026-02-19T03:10:30.385785841Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-19T03:10:30.385785841Z CertConfigMapNamePrefixes: ([]string) , 2026-02-19T03:10:30.385785841Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-02-19T03:10:30.385785841Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-02-19T03:10:30.385785841Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-19T03:10:30.385785841Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-19T03:10:30.385785841Z Timeout: (time.Duration) 2m0s, 2026-02-19T03:10:30.385785841Z StaticPodManifestsLockFile: (string) "", 2026-02-19T03:10:30.385785841Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-19T03:10:30.385785841Z KubeletVersion: (string) "" 2026-02-19T03:10:30.385785841Z }) 2026-02-19T03:10:30.386356348Z I0219 03:10:30.386294 1 cmd.go:413] Getting controller reference for node master-0 2026-02-19T03:10:30.395283029Z I0219 03:10:30.395206 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-19T03:10:30.395384552Z I0219 03:10:30.395370 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-19T03:10:30.395412293Z I0219 03:10:30.395403 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-19T03:10:30.400000547Z I0219 03:10:30.399954 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-19T03:11:00.400450627Z I0219 03:11:00.400307 1 cmd.go:524] Getting installer pods for node master-0 2026-02-19T03:11:00.406625587Z I0219 03:11:00.406533 1 cmd.go:542] Latest installer revision for node master-0 is: 4 2026-02-19T03:11:00.406625587Z I0219 03:11:00.406559 1 cmd.go:431] Querying kubelet version for node master-0 2026-02-19T03:11:00.410408118Z I0219 03:11:00.410335 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-02-19T03:11:00.410408118Z I0219 03:11:00.410377 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4" ... 2026-02-19T03:11:00.410678166Z I0219 03:11:00.410604 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4" ... 2026-02-19T03:11:00.410678166Z I0219 03:11:00.410634 1 cmd.go:229] Getting secrets ... 2026-02-19T03:11:14.412021499Z I0219 03:11:14.411973 1 copy.go:24] Failed to get secret openshift-kube-scheduler/localhost-recovery-client-token-4: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets localhost-recovery-client-token-4) 2026-02-19T03:11:28.424536516Z I0219 03:11:28.424429 1 copy.go:24] Failed to get secret openshift-kube-scheduler/localhost-recovery-client-token-4: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/secrets/localhost-recovery-client-token-4?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:11:42.477655220Z I0219 03:11:42.477595 1 copy.go:24] Failed to get secret openshift-kube-scheduler/localhost-recovery-client-token-4: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/secrets/localhost-recovery-client-token-4?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:11:56.741731495Z I0219 03:11:56.741364 1 copy.go:24] Failed to get secret openshift-kube-scheduler/localhost-recovery-client-token-4: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/secrets/localhost-recovery-client-token-4?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:11:56.749107800Z F0219 03:11:56.749027 1 cmd.go:109] failed to copy: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/secrets/localhost-recovery-client-token-4?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-scheduler/installer-4-master-0.json0000640000000000000000000001627415145477665022703 0ustar0000000000000000{"metadata":{"name":"installer-4-master-0","namespace":"openshift-kube-scheduler","uid":"66b05aeb-22a8-4008-a582-072f63cc46bf","resourceVersion":"9114","creationTimestamp":"2026-02-19T03:05:50Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.53/23\"],\"mac_address\":\"0a:58:0a:80:00:35\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.53/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.53\"\n ],\n \"mac\": \"0a:58:0a:80:00:35\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-4","uid":"3b4b97f0-b183-487d-8ac4-67133882ad0d"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=4","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:51Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:57Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:57Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:51Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.53","podIPs":[{"ip":"10.128.0.53"}],"startTime":"2026-02-19T03:05:51Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"r-0 is: 4\nI0219 03:11:00.406559 1 cmd.go:431] Querying kubelet version for node master-0\nI0219 03:11:00.410335 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0\nI0219 03:11:00.410377 1 cmd.go:293] Creating target resource directory \"/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4\" ...\nI0219 03:11:00.410604 1 cmd.go:221] Creating target resource directory \"/etc/kubernetes/static-pod-resources/kube-scheduler-pod-4\" ...\nI0219 03:11:00.410634 1 cmd.go:229] Getting secrets ...\nI0219 03:11:14.411973 1 copy.go:24] Failed to get secret openshift-kube-scheduler/localhost-recovery-client-token-4: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets localhost-recovery-client-token-4)\nI0219 03:11:28.424429 1 copy.go:24] Failed to get secret openshift-kube-scheduler/localhost-recovery-client-token-4: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/secrets/localhost-recovery-client-token-4?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nI0219 03:11:42.477595 1 copy.go:24] Failed to get secret openshift-kube-scheduler/localhost-recovery-client-token-4: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/secrets/localhost-recovery-client-token-4?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nI0219 03:11:56.741364 1 copy.go:24] Failed to get secret openshift-kube-scheduler/localhost-recovery-client-token-4: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/secrets/localhost-recovery-client-token-4?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0219 03:11:56.749027 1 cmd.go:109] failed to copy: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/secrets/localhost-recovery-client-token-4?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-19T03:10:29Z","finishedAt":"2026-02-19T03:11:56Z","containerID":"cri-o://11a1463d7472cc347eeb1e18662a7476d3fc447a3850f542c02f496029d3a5bf"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7","containerID":"cri-o://11a1463d7472cc347eeb1e18662a7476d3fc447a3850f542c02f496029d3a5bf","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000005754515145477665030261 0ustar00000000000000002026-02-19T03:07:14.521481789Z preBind: {} 2026-02-19T03:07:14.521481789Z preEnqueue: {} 2026-02-19T03:07:14.521481789Z preFilter: {} 2026-02-19T03:07:14.521481789Z preScore: {} 2026-02-19T03:07:14.521481789Z queueSort: {} 2026-02-19T03:07:14.521481789Z reserve: {} 2026-02-19T03:07:14.521481789Z score: {} 2026-02-19T03:07:14.521481789Z schedulerName: default-scheduler 2026-02-19T03:07:14.521481789Z > 2026-02-19T03:07:14.524279615Z I0219 03:07:14.524211 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-02-19T03:07:14.524279615Z I0219 03:07:14.524247 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-02-19T03:07:14.527940678Z I0219 03:07:14.527876 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:07:14.528006240Z I0219 03:07:14.527965 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:07:14.528371371Z I0219 03:07:14.528319 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-02-19T03:07:14.528773323Z I0219 03:07:14.528729 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1771470374\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1771470373\" (2026-02-19 02:06:13 +0000 UTC to 2027-02-19 02:06:13 +0000 UTC (now=2026-02-19 03:07:14.528700801 +0000 UTC))" 2026-02-19T03:07:14.529055382Z I0219 03:07:14.528990 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470374\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470374\" (2026-02-19 02:06:14 +0000 UTC to 2029-02-19 02:06:14 +0000 UTC (now=2026-02-19 03:07:14.528964339 +0000 UTC))" 2026-02-19T03:07:14.529087673Z I0219 03:07:14.529061 1 secure_serving.go:213] Serving securely on [::]:10259 2026-02-19T03:07:14.529162065Z I0219 03:07:14.529123 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:07:14.538740139Z I0219 03:07:14.538642 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-02-19T03:07:14.545052783Z I0219 03:07:14.544983 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.545173966Z I0219 03:07:14.545129 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.545546078Z I0219 03:07:14.545502 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.545558228Z I0219 03:07:14.545531 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.545811586Z I0219 03:07:14.545711 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-02-19T03:07:14.545949660Z I0219 03:07:14.545899 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.545960060Z I0219 03:07:14.545950 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.546964311Z I0219 03:07:14.546924 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.547015043Z I0219 03:07:14.546987 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.547179118Z I0219 03:07:14.547118 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.547529139Z I0219 03:07:14.547493 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.548187349Z I0219 03:07:14.548149 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.555295417Z I0219 03:07:14.555206 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.555999538Z I0219 03:07:14.555943 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.556943977Z I0219 03:07:14.556877 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.558638839Z I0219 03:07:14.558568 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-02-19T03:07:14.628322297Z I0219 03:07:14.628219 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:07:14.629039759Z I0219 03:07:14.628957 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:48:35 +0000 UTC to 2036-02-17 02:48:35 +0000 UTC (now=2026-02-19 03:07:14.628918096 +0000 UTC))" 2026-02-19T03:07:14.629039759Z I0219 03:07:14.629026 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2026-02-20 02:55:16 +0000 UTC (now=2026-02-19 03:07:14.629014899 +0000 UTC))" 2026-02-19T03:07:14.629091891Z I0219 03:07:14.629052 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:07:14.629042129 +0000 UTC))" 2026-02-19T03:07:14.629103481Z I0219 03:07:14.629082 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:07:14.62907315 +0000 UTC))" 2026-02-19T03:07:14.629132512Z I0219 03:07:14.629104 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2036-02-17 02:55:14 +0000 UTC (now=2026-02-19 03:07:14.629096721 +0000 UTC))" 2026-02-19T03:07:14.629485993Z I0219 03:07:14.629436 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1771470374\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1771470373\" (2026-02-19 02:06:13 +0000 UTC to 2027-02-19 02:06:13 +0000 UTC (now=2026-02-19 03:07:14.629416601 +0000 UTC))" 2026-02-19T03:07:14.629537815Z I0219 03:07:14.629497 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-02-19T03:07:14.629724500Z I0219 03:07:14.629674 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470374\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470374\" (2026-02-19 02:06:14 +0000 UTC to 2029-02-19 02:06:14 +0000 UTC (now=2026-02-19 03:07:14.629657828 +0000 UTC))" 2026-02-19T03:07:19.630325967Z E0219 03:07:19.630075 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:07:27.857412792Z E0219 03:07:27.857239 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:07:36.318808564Z E0219 03:07:36.318668 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:07:44.516160467Z E0219 03:07:44.516013 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:07:51.751598170Z E0219 03:07:51.751461 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:08:00.599599091Z E0219 03:08:00.599470 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:08:09.813072717Z E0219 03:08:09.812976 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:08:17.968450421Z E0219 03:08:17.968249 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:08:26.599989606Z E0219 03:08:26.599876 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:08:35.717306521Z E0219 03:08:35.717162 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:08:44.943907138Z E0219 03:08:44.943740 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:08:52.662179977Z E0219 03:08:52.662028 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:09:00.690954458Z E0219 03:09:00.690846 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:09:08.284777548Z E0219 03:09:08.284717 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:09:17.304831607Z E0219 03:09:17.304691 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:09:26.083856239Z E0219 03:09:26.083700 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:09:34.238312794Z E0219 03:09:34.238126 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:09:41.469303892Z E0219 03:09:41.469087 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:09:49.442854275Z E0219 03:09:49.442752 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:09:57.531467903Z E0219 03:09:57.531358 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:10:06.626370830Z E0219 03:10:06.626199 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-02-19T03:10:13.904833443Z E0219 03:10:13.904705 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:10:22.140218841Z E0219 03:10:22.140120 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:10:30.502959888Z E0219 03:10:30.502881 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:10:37.750238653Z E0219 03:10:37.750073 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:10:46.483009437Z E0219 03:10:46.482910 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:10:53.678964190Z E0219 03:10:53.678792 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:11:02.950823872Z E0219 03:11:02.950739 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-02-19T03:11:10.959501571Z E0219 03:11:10.959347 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:11:31.560146228Z I0219 03:11:31.560055 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-02-19T03:11:31.560738035Z I0219 03:11:31.560683 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7b65dc9fcb-t6jnq" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:11:31.561067724Z I0219 03:11:31.560966 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f-4ms92" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:11:31.561367633Z I0219 03:11:31.561130 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-58fb6744f5-mh46g" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:11:37.010362627Z I0219 03:11:37.009900 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-86b8dc6d6-pd8lj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:11:37.014407556Z I0219 03:11:37.014356 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76-9vgg7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:11:37.112146574Z I0219 03:11:37.112092 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-798b897698-hmpmj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:11:37.115468201Z I0219 03:11:37.115190 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-65c5c48b9b-hl874" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:11:37.117025717Z I0219 03:11:37.115882 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-59b498fcfb-2dvkr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:11:37.117865031Z I0219 03:11:37.117831 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-6968c58f46-p2hfn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:11:37.365965336Z I0219 03:11:37.365873 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-f94476f49-dnfs9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:11:37.462326164Z I0219 03:11:37.461855 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-7f8c75f984-qsbx7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:11:38.205659043Z I0219 03:11:38.205591 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:11:38.733840929Z I0219 03:11:38.733671 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-5c7cf458b4-prbs7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:30.666411310Z I0219 03:12:30.665333 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-7d77f88776-s4jxm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:30.965010043Z I0219 03:12:30.964934 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-5t9dd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:31.561326923Z I0219 03:12:31.559736 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-nrcnx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:31.838110373Z I0219 03:12:31.838047 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-j2wxd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:33.766646426Z I0219 03:12:33.765923 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-nqnbc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:34.368810327Z I0219 03:12:34.368655 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-v9c2b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:36.043684793Z I0219 03:12:36.043548 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-54cb48566c-5t75l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:37.409774910Z I0219 03:12:37.409723 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-58fb6744f5-mh46g" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:37.418068731Z I0219 03:12:37.418016 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f-4ms92" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:37.418316459Z I0219 03:12:37.418278 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-7b65dc9fcb-t6jnq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:40.503314582Z I0219 03:12:40.499920 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-m64bf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:41.487271876Z I0219 03:12:41.487188 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-754bc4d665-tkbxr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:12:44.685402639Z I0219 03:12:44.682378 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9-tlhpc" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006662315145477665030450 0ustar00000000000000002026-02-19T03:03:25.510637529Z I0219 03:03:25.510551 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-tw8v2" 2026-02-19T03:03:31.228148578Z I0219 03:03:31.228051 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-02-19T03:03:31.285361249Z I0219 03:03:31.285278 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-6569778c84-qcd49" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:31.382003298Z I0219 03:03:31.381692 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5-c7c8v" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:31.481365097Z I0219 03:03:31.481303 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-w5pp8" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:31.581516227Z I0219 03:03:31.581409 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-k7xlc" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:31.681252686Z I0219 03:03:31.681167 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-6bb6d78bf-2vmxq" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:31.795940234Z I0219 03:03:31.795843 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-image-registry/cluster-image-registry-operator-779979bdf7-cfdqh" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:31.885820776Z I0219 03:03:31.885731 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/catalog-operator-596f79dd6f-sbzsk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:32.005959967Z I0219 03:03:32.005809 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-6f5488b997-xxdh5" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:32.090426338Z I0219 03:03:32.090244 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-7d7db75979-jbztp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:03:32.188214687Z I0219 03:03:32.188068 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-8tbg8" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:32.286410646Z I0219 03:03:32.286204 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-fc889cfd5-866f9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:32.385096707Z I0219 03:03:32.384843 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-c48c8bf7c-f7fvc" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:32.488208865Z I0219 03:03:32.487931 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/olm-operator-5499d7f7bb-kk77t" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:32.590545981Z I0219 03:03:32.590386 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-6fb4df594f-mtqxj" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:32.686844190Z I0219 03:03:32.686758 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-5bd7768f54-f8dfs" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:32.787906034Z I0219 03:03:32.787787 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-bcf775fc9-dcpwb" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:32.886050742Z I0219 03:03:32.885884 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-mcz8l" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:32.998337868Z I0219 03:03:32.998247 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-5cfd9759cf-dsxxt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:03:33.108620562Z I0219 03:03:33.108517 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-6f47d587d6-zn8c7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:33.182978649Z I0219 03:03:33.182829 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-8c7d49845-jlnvw" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:33.286517537Z I0219 03:03:33.286173 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-5bd7c86784-cjz9l" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:33.381551934Z I0219 03:03:33.381430 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-lbfvq" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:33.483121300Z I0219 03:03:33.483018 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-545bf96f4d-r7r6p" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:03:35.523120111Z I0219 03:03:35.523061 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-tw8v2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:03:41.788047059Z I0219 03:03:41.787944 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-b4t5r" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:03:51.648599094Z I0219 03:03:51.648497 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-4lzdj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:03:51.854194582Z I0219 03:03:51.854006 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-bs5qd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:03:52.641903677Z I0219 03:03:52.641780 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-hspwc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:03:54.636755771Z I0219 03:03:54.636649 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-5f98f4f8d5-q8pfv" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:04:04.198437028Z I0219 03:04:04.198385 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-5d8dfcdc87-7bv4h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:04.407959468Z I0219 03:04:04.407726 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-ncfjn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:06.235328288Z I0219 03:04:06.234713 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-58fb6744f5-mh46g" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:04:07.239025003Z I0219 03:04:07.238871 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-c6c25" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:09.938063994Z I0219 03:04:09.937981 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-rm5jg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:35.153605630Z I0219 03:04:35.153450 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-pw7dx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.881734879Z I0219 03:04:48.881585 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-6569778c84-qcd49" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.889477526Z I0219 03:04:48.887271 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-7bcfbc574b-k7xlc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.889477526Z I0219 03:04:48.889305 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5-c7c8v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.889607040Z I0219 03:04:48.889549 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-5bd7768f54-f8dfs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.895378 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-779979bdf7-cfdqh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.895784 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-596f79dd6f-sbzsk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.896061 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-6f5488b997-xxdh5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.896355 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b-8tbg8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.896484 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-bcf775fc9-dcpwb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.896607 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-8586dccc9b-mcz8l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.896772 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-6f47d587d6-zn8c7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.896849 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-fc889cfd5-866f9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.896974 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-c48c8bf7c-f7fvc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.897115 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-77cd4d9559-w5pp8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.897137 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-5499d7f7bb-kk77t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.897399 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-6fb4df594f-mtqxj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.897650 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-8c7d49845-jlnvw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.899126695Z I0219 03:04:48.897869 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-lbfvq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.920863418Z I0219 03:04:48.920768 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-5f98f4f8d5-q8pfv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.921026592Z I0219 03:04:48.920892 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-6bb6d78bf-2vmxq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.921187947Z I0219 03:04:48.921129 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-5bd7c86784-cjz9l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.921656159Z I0219 03:04:48.921608 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-545bf96f4d-r7r6p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:04:48.935482910Z I0219 03:04:48.935418 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-kvvll" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:01.445068189Z I0219 03:05:01.444651 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-7867b8fb7b-r22wv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:01.561841971Z I0219 03:05:01.560822 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-7444dc796b-xwpkc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:02.503458224Z I0219 03:05:02.503371 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-576b4d78bd-92gqk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:02.707683931Z I0219 03:05:02.705004 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-66b45cc56c-ghkxs" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-19T03:05:04.088625305Z I0219 03:05:04.083358 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-66b45cc56c-ghkxs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:10.244484137Z I0219 03:05:10.244194 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-5c85bff57-85d6g" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:14.794095221Z I0219 03:05:14.793992 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-6847bb4785-6trsd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:21.407333519Z I0219 03:05:21.406560 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-546884889b-hv7vs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:21.879719157Z I0219 03:05:21.879535 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-767fdf786d-rhhcr" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-19T03:05:21.905472708Z I0219 03:05:21.902137 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-67f784c959-vwd2m" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-19T03:05:23.187414418Z I0219 03:05:23.184885 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-767fdf786d-rhhcr" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-19T03:05:23.195807043Z I0219 03:05:23.195731 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-67f784c959-vwd2m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:24.864610698Z I0219 03:05:24.864519 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-957b9456f-f5s8c" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-19T03:05:25.496302929Z I0219 03:05:25.494834 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-4jl4c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:25.602301511Z I0219 03:05:25.602064 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-767fdf786d-rhhcr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:26.009218034Z I0219 03:05:26.009010 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-clndn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:26.500910391Z I0219 03:05:26.499847 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-4qvfn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:26.559985125Z I0219 03:05:26.559543 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-957b9456f-f5s8c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:26.656624427Z I0219 03:05:26.656548 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7b65dc9fcb-t6jnq" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:05:39.361195996Z I0219 03:05:39.359904 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f-4ms92" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-02-19T03:05:39.657362608Z I0219 03:05:39.657286 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-lwt4t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:40.345941255Z I0219 03:05:40.345866 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-spsn7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:40.493230735Z I0219 03:05:40.488521 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-84b8d9d697-jhj9q" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:40.592528098Z I0219 03:05:40.586368 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-9cc7d7bb-s559q" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:40.677145728Z I0219 03:05:40.676117 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7d4cccb57c-sfb9j" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-19T03:05:40.785334719Z I0219 03:05:40.782886 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-84d87bdd5b-7p6kp" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-19T03:05:40.905613045Z I0219 03:05:40.905540 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-57476485-qjgq9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:41.361426639Z I0219 03:05:41.361067 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-85f97c6ffb-qfcnk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:41.746168638Z I0219 03:05:41.745987 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-9h524" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:42.609202573Z I0219 03:05:42.607054 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7d4cccb57c-sfb9j" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-19T03:05:42.609202573Z I0219 03:05:42.607509 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-84d87bdd5b-7p6kp" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-02-19T03:05:42.748191701Z I0219 03:05:42.748114 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-2cczk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:44.614812021Z I0219 03:05:44.614225 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-84d87bdd5b-7p6kp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:44.618424417Z I0219 03:05:44.618052 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-7d4cccb57c-sfb9j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:05:55.699339322Z I0219 03:05:55.697789 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-686847ff5f-xbcf5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-02-19T03:06:02.020134557Z E0219 03:06:02.019985 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-02-19T03:06:07.021369883Z E0219 03:06:07.019919 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-02-19T03:06:07.021369883Z I0219 03:06:07.019967 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-02-19T03:06:12.021308974Z E0219 03:06:12.021229 1 leaderelection.go:322] Failed to release lock: the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io kube-scheduler) 2026-02-19T03:06:12.021373376Z E0219 03:06:12.021308 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515145477665023030 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"eed0456d-28e0-4892-a243-78c0d5dd0610","resourceVersion":"7751","creationTimestamp":"2026-02-19T03:04:24Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"56c3cb71c9851003c8de7e7c5db4b87e","kubernetes.io/config.mirror":"56c3cb71c9851003c8de7e7c5db4b87e","kubernetes.io/config.seen":"2026-02-19T03:02:57.077641413Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"31c9daf2-6e0b-415d-b71f-bd1b354f8d5d","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:06:13Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:06:13Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-19T03:04:54Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-02-19T03:06:13Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-02-19T03:03:08Z","finishedAt":"2026-02-19T03:06:12Z","containerID":"cri-o://c5c3d1fa02b48421156b365d74d212ad0520e6543ce74c7cab7039f773a737ff"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","containerID":"cri-o://66f97a9bf9e141e23feeedb30ab447633b69256badde89c081df2f08c950dbfd","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000002712515145477665034243 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-19T03:10:47.980694215Z I0219 03:10:47.978659 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:10:47.980694215Z I0219 03:10:47.980515 1 builder.go:298] cluster-policy-controller version 4.18.0-202601302238.p2.g5fd8525.assembly.stream.el9-5fd8525-5fd852525909ce6eab52972ba9ce8fcf56528eb9 2026-02-19T03:10:47.980694215Z I0219 03:10:47.980537 1 observer_polling.go:159] Starting file observer 2026-02-19T03:10:47.981516080Z I0219 03:10:47.981143 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" 2026-02-19T03:11:15.605003877Z I0219 03:11:15.604646 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-19T03:11:15.621331375Z I0219 03:11:15.621194 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-19T03:11:15.621331375Z I0219 03:11:15.621240 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-19T03:11:15.621331375Z I0219 03:11:15.621317 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-19T03:11:15.621429328Z I0219 03:11:15.621330 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-19T03:11:15.634141670Z I0219 03:11:15.634046 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:11:15.634141670Z W0219 03:11:15.634098 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:15.634141670Z W0219 03:11:15.634113 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:15.634141670Z W0219 03:11:15.634124 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:11:15.634141670Z W0219 03:11:15.634132 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:11:15.634189341Z W0219 03:11:15.634141 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:11:15.634189341Z W0219 03:11:15.634149 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:11:15.634491370Z I0219 03:11:15.634436 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-19T03:11:15.644347338Z I0219 03:11:15.640663 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-19T03:11:15.644347338Z I0219 03:11:15.640927 1 leaderelection.go:254] attempting to acquire leader lease kube-system/cluster-policy-controller-lock... 2026-02-19T03:11:15.644347338Z I0219 03:11:15.644180 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" certDetail="\"system:admin\" [client] groups=[system:masters] issuer=\"kube-control-plane-signer\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:17 +0000 UTC (now=2026-02-19 03:11:15.644139732 +0000 UTC))" 2026-02-19T03:11:15.644401940Z I0219 03:11:15.644351 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470648\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470648\" (2026-02-19 02:10:47 +0000 UTC to 2027-02-19 02:10:47 +0000 UTC (now=2026-02-19 03:11:15.644326097 +0000 UTC))" 2026-02-19T03:11:15.644401940Z I0219 03:11:15.644371 1 secure_serving.go:213] Serving securely on 127.0.0.1:10357 2026-02-19T03:11:15.644401940Z I0219 03:11:15.644385 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-19T03:11:15.644451821Z I0219 03:11:15.644399 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-19T03:11:15.644451821Z I0219 03:11:15.644421 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:11:15.644471322Z I0219 03:11:15.644438 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:11:15.644488882Z I0219 03:11:15.644464 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:11:15.644488882Z I0219 03:11:15.644476 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:15.644523413Z I0219 03:11:15.644494 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:11:15.644523413Z I0219 03:11:15.644501 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:15.644610186Z I0219 03:11:15.644558 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" 2026-02-19T03:11:15.650226990Z I0219 03:11:15.650136 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:11:15.656739160Z I0219 03:11:15.656676 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:11:15.658369368Z I0219 03:11:15.658284 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:11:15.744793255Z I0219 03:11:15.744694 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:15.744793255Z I0219 03:11:15.744748 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-19T03:11:15.744953310Z I0219 03:11:15.744907 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:15.745068613Z I0219 03:11:15.745020 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2026-02-20 02:55:14 +0000 UTC (now=2026-02-19 03:11:15.744977181 +0000 UTC))" 2026-02-19T03:11:15.745250499Z I0219 03:11:15.745186 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" certDetail="\"system:admin\" [client] groups=[system:masters] issuer=\"kube-control-plane-signer\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:17 +0000 UTC (now=2026-02-19 03:11:15.745172146 +0000 UTC))" 2026-02-19T03:11:15.745386543Z I0219 03:11:15.745344 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470648\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470648\" (2026-02-19 02:10:47 +0000 UTC to 2027-02-19 02:10:47 +0000 UTC (now=2026-02-19 03:11:15.745328191 +0000 UTC))" 2026-02-19T03:11:15.745544457Z I0219 03:11:15.745484 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:48:35 +0000 UTC to 2036-02-17 02:48:35 +0000 UTC (now=2026-02-19 03:11:15.745437474 +0000 UTC))" 2026-02-19T03:11:15.745544457Z I0219 03:11:15.745511 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2026-02-20 02:55:16 +0000 UTC (now=2026-02-19 03:11:15.745498476 +0000 UTC))" 2026-02-19T03:11:15.745544457Z I0219 03:11:15.745530 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:11:15.745516687 +0000 UTC))" 2026-02-19T03:11:15.745569498Z I0219 03:11:15.745545 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:11:15.745537577 +0000 UTC))" 2026-02-19T03:11:15.745569498Z I0219 03:11:15.745559 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2036-02-17 02:55:14 +0000 UTC (now=2026-02-19 03:11:15.745551148 +0000 UTC))" 2026-02-19T03:11:15.745586779Z I0219 03:11:15.745573 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2026-02-20 02:55:14 +0000 UTC (now=2026-02-19 03:11:15.745565928 +0000 UTC))" 2026-02-19T03:11:15.745724433Z I0219 03:11:15.745671 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" certDetail="\"system:admin\" [client] groups=[system:masters] issuer=\"kube-control-plane-signer\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:17 +0000 UTC (now=2026-02-19 03:11:15.745661201 +0000 UTC))" 2026-02-19T03:11:15.745867737Z I0219 03:11:15.745790 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470648\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470648\" (2026-02-19 02:10:47 +0000 UTC to 2027-02-19 02:10:47 +0000 UTC (now=2026-02-19 03:11:15.745772374 +0000 UTC))" kube-controller-manager_current.log0000640000000000000000000007265715145477665033635 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-19T03:11:39.190173334Z I0219 03:11:39.190084 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: default-cni-sysctl-allowlist, uid: 7bc25d76-b1e9-4a08-bfdb-da0e3461149d]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"97a1c707-3ac3-408c-9705-7aae071fa0de","controller":true,"blockOwnerDeletion":true}] 2026-02-19T03:11:39.192328617Z I0219 03:11:39.192245 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: multus-daemon-config, uid: 3ee0618a-bbb9-4bef-8f14-69eabaf1ec2a]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"97a1c707-3ac3-408c-9705-7aae071fa0de","controller":true,"blockOwnerDeletion":true}] 2026-02-19T03:11:39.195559602Z I0219 03:11:39.195504 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: whereabouts-config, uid: 5c05639e-20d4-44b2-8844-fce531e7d3a8]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"97a1c707-3ac3-408c-9705-7aae071fa0de","controller":true,"blockOwnerDeletion":true}] 2026-02-19T03:11:39.203520205Z I0219 03:11:39.203450 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-node-identity, name: ovnkube-identity-cm, uid: cd2d9a97-17f2-4b3c-9511-469049907103]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"97a1c707-3ac3-408c-9705-7aae071fa0de","controller":true,"blockOwnerDeletion":true}] 2026-02-19T03:11:39.205953206Z I0219 03:11:39.205913 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-operator, name: applied-cluster, uid: c48daad0-f89f-4663-b2d9-c921f9880fb3]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"97a1c707-3ac3-408c-9705-7aae071fa0de","controller":true,"blockOwnerDeletion":true}] 2026-02-19T03:11:39.209461698Z I0219 03:11:39.209412 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-operator, name: iptables-alerter-script, uid: 6ecfc5c2-8833-49fc-bf0a-363ea125627f]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"97a1c707-3ac3-408c-9705-7aae071fa0de","controller":true,"blockOwnerDeletion":true}] 2026-02-19T03:11:39.213408904Z I0219 03:11:39.213350 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-operator-lifecycle-manager, name: collect-profiles-config, uid: 7293946a-7e34-4fe2-8255-f7e1608039f6]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955"}] 2026-02-19T03:11:39.216111423Z I0219 03:11:39.216027 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-config, uid: 44de688b-00c5-4bd8-b291-a3ed5085fa4f]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"97a1c707-3ac3-408c-9705-7aae071fa0de","controller":true,"blockOwnerDeletion":true}] 2026-02-19T03:11:39.219441210Z I0219 03:11:39.219375 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-script-lib, uid: 673a66d1-cedb-43ac-aba6-22215517ec3d]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"97a1c707-3ac3-408c-9705-7aae071fa0de","controller":true,"blockOwnerDeletion":true}] 2026-02-19T03:11:39.222605793Z I0219 03:11:39.222554 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-service-ca-operator, name: service-ca-operator-config, uid: be3f4ebf-76c5-4403-9c2e-7f8f8abe3bf9]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}] 2026-02-19T03:11:39.267663881Z I0219 03:11:39.267592 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-7f8c75f984" duration="12.866096ms" 2026-02-19T03:11:39.267707152Z I0219 03:11:39.267664 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-7f8c75f984" duration="36.812µs" 2026-02-19T03:11:42.285438881Z I0219 03:11:42.285307 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="68.141µs" 2026-02-19T03:11:42.378945010Z I0219 03:11:42.378888 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76" duration="22.470194ms" 2026-02-19T03:11:42.379027742Z I0219 03:11:42.378975 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-d6bb9bb76" duration="43.092µs" 2026-02-19T03:11:42.421732474Z I0219 03:11:42.419681 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-f94476f49" duration="16.597133ms" 2026-02-19T03:11:42.421732474Z I0219 03:11:42.420597 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-f94476f49" duration="70.342µs" 2026-02-19T03:11:42.429099548Z I0219 03:11:42.429047 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-59b498fcfb" duration="9.005471ms" 2026-02-19T03:11:42.429162560Z I0219 03:11:42.429143 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-59b498fcfb" duration="63.792µs" 2026-02-19T03:11:43.297781710Z I0219 03:11:43.297692 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="55.942µs" 2026-02-19T03:11:44.301593172Z I0219 03:11:44.301396 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="77.003µs" 2026-02-19T03:11:46.950738920Z I0219 03:11:46.950648 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b" duration="9.427994ms" 2026-02-19T03:11:46.950907375Z I0219 03:11:46.950872 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/package-server-manager-5c75f78c8b" duration="58.672µs" 2026-02-19T03:11:48.348476826Z I0219 03:11:48.348396 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-etcd-operator/etcd-operator-545bf96f4d" duration="11.197745ms" 2026-02-19T03:11:48.348692922Z I0219 03:11:48.348659 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-etcd-operator/etcd-operator-545bf96f4d" duration="71.682µs" 2026-02-19T03:11:55.378947484Z I0219 03:11:55.378822 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="97.493µs" 2026-02-19T03:11:59.453910657Z I0219 03:11:59.452306 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5" duration="14.048039ms" 2026-02-19T03:11:59.453910657Z I0219 03:11:59.452427 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5" duration="64.532µs" 2026-02-19T03:12:06.868076374Z I0219 03:12:06.867952 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="89.543µs" 2026-02-19T03:12:06.907912792Z E0219 03:12:06.907748 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-02-19T03:12:06.990349359Z I0219 03:12:06.990221 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-02-19T03:12:19.589711764Z I0219 03:12:19.589580 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="82.013µs" 2026-02-19T03:12:29.999983349Z I0219 03:12:29.999278 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/Secret, namespace: openshift-etcd-operator, name: etcd-client, uid: 9229a369-82b0-4335-a0d6-635a3da8bf64]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955"}] 2026-02-19T03:12:30.001309758Z I0219 03:12:30.001227 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/Secret, namespace: openshift-operator-lifecycle-manager, name: pprof-cert, uid: d629fab3-bc51-4e04-ab93-51ff04fb6121]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955"}] 2026-02-19T03:12:30.638137147Z I0219 03:12:30.638012 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-operator-lifecycle-manager/packageserver-7d77f88776" need=1 creating=1 2026-02-19T03:12:30.655875963Z I0219 03:12:30.655797 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/packageserver" err="Operation cannot be fulfilled on deployments.apps \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-19T03:12:30.663920987Z I0219 03:12:30.663853 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7d77f88776" duration="25.880113ms" 2026-02-19T03:12:30.679922363Z I0219 03:12:30.679860 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7d77f88776" duration="15.951274ms" 2026-02-19T03:12:30.679987034Z I0219 03:12:30.679963 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7d77f88776" duration="64.142µs" 2026-02-19T03:12:30.683193478Z I0219 03:12:30.683151 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7d77f88776" duration="23.65µs" 2026-02-19T03:12:30.704833547Z I0219 03:12:30.704762 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7d77f88776" duration="39.211µs" 2026-02-19T03:12:30.782446904Z I0219 03:12:30.780164 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/packageserver" err="Operation cannot be fulfilled on deployments.apps \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-19T03:12:30.802383074Z I0219 03:12:30.802299 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/packageserver" err="Operation cannot be fulfilled on deployments.apps \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-19T03:12:31.411389303Z I0219 03:12:31.411191 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7d77f88776" duration="39.121µs" 2026-02-19T03:12:31.652300489Z I0219 03:12:31.651927 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7d77f88776" duration="51.522µs" 2026-02-19T03:12:32.183743924Z I0219 03:12:32.183634 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7d77f88776" duration="12.72796ms" 2026-02-19T03:12:32.183816356Z I0219 03:12:32.183760 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/packageserver-7d77f88776" duration="77.082µs" 2026-02-19T03:12:34.884192804Z I0219 03:12:34.884121 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d" duration="95.593µs" 2026-02-19T03:12:36.013374462Z I0219 03:12:36.013287 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-config-operator/machine-config-controller-54cb48566c" need=1 creating=1 2026-02-19T03:12:36.033071044Z I0219 03:12:36.032991 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-19T03:12:36.044697322Z I0219 03:12:36.044119 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="30.943689ms" 2026-02-19T03:12:36.054866698Z I0219 03:12:36.054789 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-19T03:12:36.055106565Z I0219 03:12:36.055057 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="10.893516ms" 2026-02-19T03:12:36.055225129Z I0219 03:12:36.055183 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="71.552µs" 2026-02-19T03:12:36.059995457Z I0219 03:12:36.059948 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="51.942µs" 2026-02-19T03:12:36.076303892Z I0219 03:12:36.076224 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="50.972µs" 2026-02-19T03:12:37.026362220Z E0219 03:12:36.921472 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-02-19T03:12:37.026362220Z I0219 03:12:37.004962 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-02-19T03:12:37.067912788Z I0219 03:12:37.067845 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="45.031µs" 2026-02-19T03:12:37.410093509Z I0219 03:12:37.410007 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="40.292µs" 2026-02-19T03:12:37.414823457Z I0219 03:12:37.414719 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f" duration="84.533µs" 2026-02-19T03:12:37.415281600Z I0219 03:12:37.415208 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7b65dc9fcb" duration="447.503µs" 2026-02-19T03:12:37.430881174Z I0219 03:12:37.430831 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f" duration="53.991µs" 2026-02-19T03:12:37.431065419Z I0219 03:12:37.431048 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="23.781µs" 2026-02-19T03:12:37.447935920Z I0219 03:12:37.447884 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="51.281µs" 2026-02-19T03:12:37.465231503Z I0219 03:12:37.465174 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f" duration="93.903µs" 2026-02-19T03:12:37.488793308Z I0219 03:12:37.488712 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7b65dc9fcb" duration="60.241µs" 2026-02-19T03:12:37.779337837Z I0219 03:12:37.779243 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="10.896717ms" 2026-02-19T03:12:37.779382699Z I0219 03:12:37.779372 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-54cb48566c" duration="61.952µs" 2026-02-19T03:12:38.165216608Z I0219 03:12:38.165144 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="40.832µs" 2026-02-19T03:12:38.245345088Z I0219 03:12:38.241657 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f" duration="57.752µs" 2026-02-19T03:12:38.819603168Z I0219 03:12:38.819514 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="7.159748ms" 2026-02-19T03:12:38.819603168Z I0219 03:12:38.819593 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-58fb6744f5" duration="43.712µs" 2026-02-19T03:12:40.798817405Z I0219 03:12:40.798729 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7b65dc9fcb" duration="78.592µs" 2026-02-19T03:12:40.830354492Z I0219 03:12:40.828073 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f" duration="10.128445ms" 2026-02-19T03:12:40.830354492Z I0219 03:12:40.829479 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-75d56db95f" duration="98.773µs" 2026-02-19T03:12:41.467607714Z I0219 03:12:41.467531 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/prometheus-operator-754bc4d665" need=1 creating=1 2026-02-19T03:12:41.484755143Z I0219 03:12:41.484666 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-19T03:12:41.488812981Z I0219 03:12:41.488744 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-754bc4d665" duration="21.242527ms" 2026-02-19T03:12:41.500233423Z I0219 03:12:41.500134 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-754bc4d665" duration="11.3477ms" 2026-02-19T03:12:41.500288244Z I0219 03:12:41.500228 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-754bc4d665" duration="55.802µs" 2026-02-19T03:12:41.514448976Z I0219 03:12:41.514361 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-754bc4d665" duration="55.321µs" 2026-02-19T03:12:42.253399164Z I0219 03:12:42.253290 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-798b897698" need=0 deleting=1 2026-02-19T03:12:42.253399164Z I0219 03:12:42.253338 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-798b897698" relatedReplicaSets=["openshift-cluster-machine-approver/machine-approver-798b897698"] 2026-02-19T03:12:42.253399164Z I0219 03:12:42.253383 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="machine-approver-798b897698" pod="openshift-cluster-machine-approver/machine-approver-798b897698-hmpmj" 2026-02-19T03:12:42.268627437Z I0219 03:12:42.268524 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cluster-machine-approver/machine-approver" err="Operation cannot be fulfilled on deployments.apps \"machine-approver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-19T03:12:42.268683419Z I0219 03:12:42.268632 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-798b897698" duration="15.400518ms" 2026-02-19T03:12:42.276175087Z I0219 03:12:42.276085 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-798b897698" duration="7.407656ms" 2026-02-19T03:12:42.276210858Z I0219 03:12:42.276200 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-798b897698" duration="64.191µs" 2026-02-19T03:12:42.283475219Z I0219 03:12:42.283412 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cluster-machine-approver/machine-approver" err="Operation cannot be fulfilled on deployments.apps \"machine-approver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-19T03:12:44.391312787Z I0219 03:12:44.386145 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-798b897698" duration="39.591µs" 2026-02-19T03:12:44.599091149Z I0219 03:12:44.598104 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-798b897698" duration="112.233µs" 2026-02-19T03:12:44.606116273Z I0219 03:12:44.604587 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-798b897698" duration="42.242µs" 2026-02-19T03:12:44.631488881Z I0219 03:12:44.631290 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" need=1 creating=1 2026-02-19T03:12:44.656542170Z I0219 03:12:44.656465 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cluster-machine-approver/machine-approver" err="Operation cannot be fulfilled on deployments.apps \"machine-approver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-19T03:12:44.681151335Z I0219 03:12:44.681033 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" duration="49.814359ms" 2026-02-19T03:12:44.724670461Z I0219 03:12:44.724593 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" duration="43.473674ms" 2026-02-19T03:12:44.724723533Z I0219 03:12:44.724701 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" duration="61.162µs" 2026-02-19T03:12:44.724752163Z I0219 03:12:44.724735 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" duration="20.551µs" 2026-02-19T03:12:44.731530450Z I0219 03:12:44.731478 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-machine-approver/machine-approver-7dd9c7d7b9" duration="39.651µs" cluster-policy-controller_previous.log0000640000000000000000000012146515145477665034437 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-19T03:03:48.892441541Z I0219 03:03:48.892325 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-multus namespace 2026-02-19T03:03:49.200104138Z W0219 03:03:49.199976 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-19T03:03:49.200104138Z E0219 03:03:49.200046 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-19T03:03:49.367273104Z I0219 03:03:49.367165 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1, Resource=network-attachment-definitions whereabouts.cni.cncf.io/v1alpha1, Resource=ippools whereabouts.cni.cncf.io/v1alpha1, Resource=nodeslicepools whereabouts.cni.cncf.io/v1alpha1, Resource=overlappingrangeipreservations], removed: [] 2026-02-19T03:03:49.367336556Z I0219 03:03:49.367307 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="nodeslicepools.whereabouts.cni.cncf.io" 2026-02-19T03:03:49.367336556Z I0219 03:03:49.367328 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ippools.whereabouts.cni.cncf.io" 2026-02-19T03:03:49.367355607Z I0219 03:03:49.367346 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="network-attachment-definitions.k8s.cni.cncf.io" 2026-02-19T03:03:49.367404868Z I0219 03:03:49.367384 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="overlappingrangeipreservations.whereabouts.cni.cncf.io" 2026-02-19T03:03:49.381836684Z I0219 03:03:49.381728 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:03:49.390739486Z I0219 03:03:49.390666 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:03:49.400699686Z I0219 03:03:49.400622 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:03:49.410697246Z I0219 03:03:49.410622 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:03:49.468049381Z I0219 03:03:49.467992 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-02-19T03:03:49.815072023Z I0219 03:03:49.814986 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-02-19T03:03:50.019760157Z I0219 03:03:50.019710 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "whereabouts-cni" not found 2026-02-19T03:03:55.628317779Z I0219 03:03:55.628166 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ovn-kubernetes namespace 2026-02-19T03:04:03.626600146Z I0219 03:04:03.626513 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-host-network namespace 2026-02-19T03:04:04.912175187Z I0219 03:04:04.912080 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-diagnostics namespace 2026-02-19T03:04:08.028477873Z I0219 03:04:08.028360 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-network-node-identity namespace 2026-02-19T03:04:08.413359645Z I0219 03:04:08.413243 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "network-node-identity" not found 2026-02-19T03:04:08.816353453Z I0219 03:04:08.816299 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "network-node-identity-leases" not found 2026-02-19T03:04:12.427685133Z E0219 03:04:12.427623 1 leaderelection.go:429] Failed to update lock optimitically: Operation cannot be fulfilled on leases.coordination.k8s.io "cluster-policy-controller-lock": StorageError: invalid object, Code: 4, Key: /kubernetes.io/leases/kube-system/cluster-policy-controller-lock, ResourceVersion: 0, AdditionalErrorMsg: Precondition failed: UID in precondition: 689f0a1d-7ea7-4d3f-98c0-42ece3937f9b, UID in object meta: , falling back to slow path 2026-02-19T03:04:19.474396946Z I0219 03:04:19.474328 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [k8s.cni.cncf.io/v1alpha1, Resource=ipamclaims k8s.ovn.org/v1, Resource=egressfirewalls k8s.ovn.org/v1, Resource=egressqoses k8s.ovn.org/v1, Resource=egressservices k8s.ovn.org/v1, Resource=userdefinednetworks], removed: [] 2026-02-19T03:04:19.474502019Z I0219 03:04:19.474468 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressfirewalls.k8s.ovn.org" 2026-02-19T03:04:19.474502019Z I0219 03:04:19.474497 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressqoses.k8s.ovn.org" 2026-02-19T03:04:19.474539560Z I0219 03:04:19.474523 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="ipamclaims.k8s.cni.cncf.io" 2026-02-19T03:04:19.474550490Z I0219 03:04:19.474543 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="userdefinednetworks.k8s.ovn.org" 2026-02-19T03:04:19.474585391Z I0219 03:04:19.474560 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="egressservices.k8s.ovn.org" 2026-02-19T03:04:19.476660457Z I0219 03:04:19.476613 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:04:19.476660457Z I0219 03:04:19.476632 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:04:19.476660457Z I0219 03:04:19.476646 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:04:19.476705378Z I0219 03:04:19.476672 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:04:19.476705378Z I0219 03:04:19.476645 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:04:19.575133418Z I0219 03:04:19.575075 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-02-19T03:04:39.190334188Z W0219 03:04:39.190158 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-19T03:04:39.190334188Z E0219 03:04:39.190245 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-19T03:05:00.098836995Z I0219 03:05:00.098680 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-controller-manager namespace 2026-02-19T03:05:00.273482469Z I0219 03:05:00.273398 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-route-controller-manager namespace 2026-02-19T03:05:01.146663156Z I0219 03:05:01.144999 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-service-ca namespace 2026-02-19T03:05:06.743301421Z I0219 03:05:06.743198 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:05:09.132956987Z I0219 03:05:09.132867 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-kube-storage-version-migrator namespace 2026-02-19T03:05:12.480858983Z I0219 03:05:12.480776 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-apiserver namespace 2026-02-19T03:05:19.590431112Z I0219 03:05:19.590375 1 reconciliation_controller.go:207] syncing resource quota controller with updated resources from discovery: added: [snapshot.storage.k8s.io/v1, Resource=volumesnapshots], removed: [] 2026-02-19T03:05:19.590535835Z I0219 03:05:19.590490 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" resource="volumesnapshots.snapshot.storage.k8s.io" 2026-02-19T03:05:20.584334427Z I0219 03:05:20.581807 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:05:20.593486002Z I0219 03:05:20.591450 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-02-19T03:05:21.804834849Z I0219 03:05:21.804755 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-oauth-apiserver namespace 2026-02-19T03:05:24.124302654Z I0219 03:05:24.123650 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-authentication namespace 2026-02-19T03:05:25.758317996Z I0219 03:05:25.754295 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-dns namespace 2026-02-19T03:05:26.556130902Z I0219 03:05:26.555839 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-ingress namespace 2026-02-19T03:05:31.347700046Z I0219 03:05:31.346456 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-operator-controller namespace 2026-02-19T03:05:31.387139203Z I0219 03:05:31.386664 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-catalogd namespace 2026-02-19T03:05:32.519207513Z I0219 03:05:32.518887 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:openshift:useroauthaccesstoken-manager" not found 2026-02-19T03:05:34.533776922Z W0219 03:05:34.533694 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io) 2026-02-19T03:05:34.533816083Z E0219 03:05:34.533777 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server could not find the requested resource (get imagestreams.image.openshift.io)" 2026-02-19T03:05:35.199666070Z I0219 03:05:35.199598 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-02-19T03:05:38.920758524Z I0219 03:05:38.920654 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-wzjm7" has been approved 2026-02-19T03:05:38.949342991Z I0219 03:05:38.949248 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-monitoring-dflh7" has been approved 2026-02-19T03:05:39.790097788Z I0219 03:05:39.790027 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "cloud-credential-operator-role" not found 2026-02-19T03:05:42.659214235Z I0219 03:05:42.659142 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift namespace 2026-02-19T03:05:42.682914910Z I0219 03:05:42.682631 1 event.go:377] Event(v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"bootstrap-kube-controller-manager-master-0", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CreatedSCCRanges' created SCC ranges for openshift-node namespace 2026-02-19T03:05:50.604304580Z I0219 03:05:50.603674 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1 2026-02-19T03:05:50.604304580Z E0219 03:05:50.603787 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1" 2026-02-19T03:06:20.452370361Z W0219 03:06:20.452240 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:06:20.452370361Z E0219 03:06:20.452320 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:06:20.616300911Z I0219 03:06:20.616186 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-19T03:06:20.616351412Z E0219 03:06:20.616298 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-19T03:06:46.894772944Z E0219 03:06:46.894693 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-19T03:06:50.628770272Z I0219 03:06:50.628577 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-19T03:06:50.628770272Z E0219 03:06:50.628723 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-19T03:06:55.036340401Z W0219 03:06:55.036204 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:06:55.036340401Z E0219 03:06:55.036302 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:07:20.640883910Z I0219 03:07:20.640753 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-19T03:07:20.640954732Z E0219 03:07:20.640881 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-19T03:07:46.897021361Z E0219 03:07:46.896926 1 leaderelection.go:436] error retrieving resource lock kube-system/cluster-policy-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-policy-controller-lock) 2026-02-19T03:07:50.649821847Z I0219 03:07:50.649716 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-19T03:07:50.649821847Z E0219 03:07:50.649793 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-19T03:07:54.105435795Z W0219 03:07:54.105327 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:07:54.105435795Z E0219 03:07:54.105392 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:08:20.659128141Z I0219 03:08:20.659015 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-19T03:08:20.659128141Z E0219 03:08:20.659106 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-19T03:08:49.997136848Z W0219 03:08:49.997026 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:08:49.997136848Z E0219 03:08:49.997081 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:08:50.672006415Z I0219 03:08:50.671881 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-19T03:08:50.672074197Z E0219 03:08:50.672029 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-19T03:09:20.680606482Z I0219 03:09:20.680481 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-19T03:09:20.680606482Z E0219 03:09:20.680580 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-19T03:09:20.901287036Z E0219 03:09:20.901141 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-19T03:09:25.725479248Z W0219 03:09:25.725406 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:09:25.725479248Z E0219 03:09:25.725458 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:09:50.691324556Z I0219 03:09:50.691190 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-19T03:09:50.691391347Z E0219 03:09:50.691327 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-19T03:10:12.893051133Z E0219 03:10:12.892918 1 leaderelection.go:436] error retrieving resource lock kube-system/cluster-policy-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/cluster-policy-controller-lock?timeout=4m0s": context deadline exceeded 2026-02-19T03:10:12.893719103Z I0219 03:10:12.893049 1 leaderelection.go:297] failed to renew lease kube-system/cluster-policy-controller-lock: timed out waiting for the condition 2026-02-19T03:10:20.701824537Z I0219 03:10:20.701711 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-19T03:10:20.701885849Z E0219 03:10:20.701825 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-19T03:10:20.762919654Z W0219 03:10:20.762846 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-19T03:10:20.762973815Z E0219 03:10:20.762912 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-19T03:10:46.896084498Z E0219 03:10:46.895979 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:10:46.896166240Z W0219 03:10:46.896119 1 leaderelection.go:84] leader election lost kube-controller-manager_previous.log0000640000000000000000000003173215145477665034014 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-19T03:09:52.493481569Z I0219 03:09:52.493474 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-02-19T03:09:52.493491489Z I0219 03:09:52.493479 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-02-19T03:09:52.493491489Z I0219 03:09:52.493484 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-02-19T03:09:52.493501070Z I0219 03:09:52.493490 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-02-19T03:09:52.493501070Z I0219 03:09:52.493496 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-02-19T03:09:52.493509820Z I0219 03:09:52.493502 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-02-19T03:09:52.493517820Z I0219 03:09:52.493507 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-02-19T03:09:52.493517820Z I0219 03:09:52.493512 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-02-19T03:09:52.493526240Z I0219 03:09:52.493516 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-02-19T03:09:52.493526240Z I0219 03:09:52.493521 1 flags.go:64] FLAG: --secure-port="10257" 2026-02-19T03:09:52.493534931Z I0219 03:09:52.493526 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-02-19T03:09:52.493534931Z I0219 03:09:52.493531 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-02-19T03:09:52.493543951Z I0219 03:09:52.493535 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-02-19T03:09:52.493543951Z I0219 03:09:52.493539 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-02-19T03:09:52.493553241Z I0219 03:09:52.493544 1 flags.go:64] FLAG: --tls-cert-file="" 2026-02-19T03:09:52.493553241Z I0219 03:09:52.493549 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-02-19T03:09:52.493562282Z I0219 03:09:52.493554 1 flags.go:64] FLAG: --tls-min-version="" 2026-02-19T03:09:52.493562282Z I0219 03:09:52.493558 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-02-19T03:09:52.493571152Z I0219 03:09:52.493562 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-02-19T03:09:52.493579712Z I0219 03:09:52.493568 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-02-19T03:09:52.493579712Z I0219 03:09:52.493573 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-02-19T03:09:52.493588642Z I0219 03:09:52.493577 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-02-19T03:09:52.493588642Z I0219 03:09:52.493582 1 flags.go:64] FLAG: --v="2" 2026-02-19T03:09:52.493597603Z I0219 03:09:52.493589 1 flags.go:64] FLAG: --version="false" 2026-02-19T03:09:52.493605963Z I0219 03:09:52.493595 1 flags.go:64] FLAG: --vmodule="" 2026-02-19T03:09:52.493818119Z W0219 03:09:52.493782 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-02-19T03:09:52.493818119Z W0219 03:09:52.493796 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-02-19T03:09:52.493818119Z W0219 03:09:52.493800 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-02-19T03:09:52.493818119Z W0219 03:09:52.493804 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-02-19T03:09:52.493818119Z W0219 03:09:52.493809 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-02-19T03:09:52.493818119Z W0219 03:09:52.493814 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-02-19T03:09:52.493844790Z W0219 03:09:52.493818 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-02-19T03:09:52.493844790Z W0219 03:09:52.493822 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-02-19T03:09:52.493844790Z W0219 03:09:52.493826 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-02-19T03:09:52.493844790Z W0219 03:09:52.493831 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-02-19T03:09:52.493844790Z W0219 03:09:52.493837 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-02-19T03:09:52.493844790Z W0219 03:09:52.493842 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-02-19T03:09:52.493855500Z W0219 03:09:52.493847 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-02-19T03:09:52.493863980Z W0219 03:09:52.493852 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-02-19T03:09:52.493863980Z W0219 03:09:52.493858 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-02-19T03:09:52.493873121Z W0219 03:09:52.493862 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-02-19T03:09:52.493873121Z W0219 03:09:52.493867 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-02-19T03:09:52.493882121Z W0219 03:09:52.493870 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-02-19T03:09:52.493882121Z W0219 03:09:52.493876 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-02-19T03:09:52.493891671Z W0219 03:09:52.493879 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-02-19T03:09:52.493891671Z W0219 03:09:52.493884 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-02-19T03:09:52.493891671Z W0219 03:09:52.493888 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-02-19T03:09:52.493901171Z W0219 03:09:52.493892 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-02-19T03:09:52.493901171Z W0219 03:09:52.493897 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-02-19T03:09:52.493909902Z W0219 03:09:52.493901 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-02-19T03:09:52.493909902Z W0219 03:09:52.493905 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-02-19T03:09:52.493918692Z W0219 03:09:52.493909 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-02-19T03:09:52.493918692Z W0219 03:09:52.493914 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-02-19T03:09:52.493927402Z W0219 03:09:52.493918 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-02-19T03:09:52.493927402Z W0219 03:09:52.493922 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-02-19T03:09:52.493936282Z W0219 03:09:52.493927 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-02-19T03:09:52.493936282Z W0219 03:09:52.493933 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-02-19T03:09:52.493949593Z W0219 03:09:52.493939 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-02-19T03:09:52.493949593Z W0219 03:09:52.493943 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-02-19T03:09:52.493958293Z W0219 03:09:52.493948 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-02-19T03:09:52.493958293Z W0219 03:09:52.493952 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-02-19T03:09:52.493966913Z W0219 03:09:52.493956 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-02-19T03:09:52.493966913Z W0219 03:09:52.493960 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-02-19T03:09:52.493966913Z W0219 03:09:52.493964 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-02-19T03:09:52.493976314Z W0219 03:09:52.493967 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-02-19T03:09:52.493976314Z W0219 03:09:52.493972 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-02-19T03:09:52.493985014Z W0219 03:09:52.493976 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-02-19T03:09:52.493985014Z W0219 03:09:52.493980 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-02-19T03:09:52.493994154Z W0219 03:09:52.493984 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-02-19T03:09:52.493994154Z W0219 03:09:52.493988 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-02-19T03:09:52.494003424Z W0219 03:09:52.493991 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-02-19T03:09:52.494003424Z W0219 03:09:52.493997 1 feature_gate.go:330] unrecognized feature gate: Example 2026-02-19T03:09:52.494012595Z W0219 03:09:52.494001 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-02-19T03:09:52.494012595Z W0219 03:09:52.494006 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-02-19T03:09:52.494022205Z W0219 03:09:52.494010 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-02-19T03:09:52.494022205Z W0219 03:09:52.494014 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-02-19T03:09:52.494022205Z W0219 03:09:52.494018 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-02-19T03:09:52.494031985Z W0219 03:09:52.494023 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-02-19T03:09:52.494031985Z W0219 03:09:52.494027 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-02-19T03:09:52.494040706Z W0219 03:09:52.494032 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-02-19T03:09:52.494040706Z W0219 03:09:52.494036 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-02-19T03:09:52.494051316Z W0219 03:09:52.494044 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-02-19T03:09:52.494059856Z W0219 03:09:52.494049 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-02-19T03:09:52.494059856Z W0219 03:09:52.494055 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-02-19T03:09:52.494073926Z W0219 03:09:52.494059 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-02-19T03:09:52.494073926Z W0219 03:09:52.494064 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-02-19T03:09:52.494073926Z W0219 03:09:52.494069 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-02-19T03:09:52.494084197Z W0219 03:09:52.494072 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-02-19T03:09:52.494084197Z W0219 03:09:52.494077 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-02-19T03:09:52.494084197Z W0219 03:09:52.494080 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-02-19T03:09:52.494093467Z W0219 03:09:52.494085 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-02-19T03:09:52.494093467Z W0219 03:09:52.494089 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-02-19T03:09:52.494102287Z W0219 03:09:52.494093 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-02-19T03:09:52.494102287Z W0219 03:09:52.494098 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-02-19T03:09:52.494110828Z W0219 03:09:52.494101 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-02-19T03:09:52.494110828Z W0219 03:09:52.494106 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-02-19T03:09:52.494119288Z W0219 03:09:52.494110 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-02-19T03:09:52.708636251Z I0219 03:09:52.708582 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-02-19T03:09:52.710902507Z I0219 03:09:52.710876 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" 2026-02-19T03:10:52.931727066Z E0219 03:10:52.931586 1 run.go:72] "command failed" err="unable to load configmap based request-header-client-ca-file: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps extension-apiserver-authentication)" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002766715145477665024660 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"161820cf-ccaf-499f-bbb7-a4a0c3f0f809","resourceVersion":"8186","creationTimestamp":"2026-02-19T03:04:40Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"c9ad9373c007a4fcd25e70622bdc8deb","kubernetes.io/config.mirror":"c9ad9373c007a4fcd25e70622bdc8deb","kubernetes.io/config.seen":"2026-02-19T03:02:57.077635693Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"31c9daf2-6e0b-415d-b71f-bd1b354f8d5d","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:17Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:17Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-19T03:04:54Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-02-19T03:10:47Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-19T03:03:11Z","finishedAt":"2026-02-19T03:10:46Z","containerID":"cri-o://6e12c2dd8c433a964ba0631c8a75130e2fb3658b0e63e79670e5c1aab6fbdf1a"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","containerID":"cri-o://7288925e11aeb25bbb335f078c9e31792f6d4f0af89b33f7a655b0486d5cedcc","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-02-19T03:10:53Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-02-19T03:09:52Z","finishedAt":"2026-02-19T03:10:52Z","containerID":"cri-o://17f060b64624663306aaff9ca8780e9e0cf400ba4cb7bb72c95042efa65abad9"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","containerID":"cri-o://f3aff87ddc1ce78f463b9bf997824b4b96ab5281b112df2f1f52b49c8a7196c2","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415145477665044503 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-7bcfbc574b-k7xlc2026-02-19T03:11:31.194035201Z I0219 03:11:31.193885 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:11:31.194035201Z I0219 03:11:31.194002 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:11:31.195786092Z I0219 03:11:31.194734 1 observer_polling.go:159] Starting file observer 2026-02-19T03:11:31.215902180Z I0219 03:11:31.215641 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601302238.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb 2026-02-19T03:11:31.723096403Z I0219 03:11:31.723027 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:11:31.723096403Z W0219 03:11:31.723058 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:31.723096403Z W0219 03:11:31.723064 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:31.723096403Z W0219 03:11:31.723070 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:11:31.723096403Z W0219 03:11:31.723075 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:11:31.723096403Z W0219 03:11:31.723079 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:11:31.723096403Z W0219 03:11:31.723083 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:11:31.726274196Z I0219 03:11:31.726226 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-19T03:11:31.726295346Z I0219 03:11:31.726283 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:11:31.726453051Z I0219 03:11:31.726329 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:11:31.726453051Z I0219 03:11:31.726418 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-19T03:11:31.726467251Z I0219 03:11:31.726351 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:11:31.726478002Z I0219 03:11:31.726470 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:31.726505603Z I0219 03:11:31.726447 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:31.726736419Z I0219 03:11:31.726590 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:11:31.726736419Z I0219 03:11:31.726722 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-19T03:11:31.726766710Z I0219 03:11:31.726750 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-02-19T03:11:31.726776271Z I0219 03:11:31.726766 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:11:31.827084984Z I0219 03:11:31.826964 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-19T03:11:31.827170247Z I0219 03:11:31.827093 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:31.827170247Z I0219 03:11:31.827148 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file kube-controller-manager-operator_previous.log0000640000000000000000000000201415145477665044675 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-7bcfbc574b-k7xlc2026-02-19T03:09:52.536338813Z I0219 03:09:52.535800 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:09:52.536338813Z I0219 03:09:52.535925 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:09:52.537070664Z I0219 03:09:52.536652 1 observer_polling.go:159] Starting file observer 2026-02-19T03:10:35.933687109Z I0219 03:10:35.933596 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601302238.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb 2026-02-19T03:11:06.201647220Z F0219 03:11:06.201534 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock": context deadline exceeded kube-controller-manager-operator-7bcfbc574b-k7xlc.json0000640000000000000000000001630615145477665033626 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-7bcfbc574b-k7xlc","generateName":"kube-controller-manager-operator-7bcfbc574b-","namespace":"openshift-kube-controller-manager-operator","uid":"6c9ed390-3b62-4b81-8c03-0c579a4a686a","resourceVersion":"8606","creationTimestamp":"2026-02-19T03:03:31Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"7bcfbc574b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-7bcfbc574b","uid":"349734a7-02ad-40f0-83e9-0a2e2315f2fa","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1a3bef9a43438ab475af89a16225f015c17bff1244015493a6a42c049a922ea4"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:31Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:31Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2026-02-19T03:04:48Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-02-19T03:11:31Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0219 03:09:52.535800 1 cmd.go:253] Using service-serving-cert provided certificates\nI0219 03:09:52.535925 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0219 03:09:52.536652 1 observer_polling.go:159] Starting file observer\nI0219 03:10:35.933596 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601302238.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb\nF0219 03:11:06.201534 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager-operator/leases/kube-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-19T03:09:52Z","finishedAt":"2026-02-19T03:11:06Z","containerID":"cri-o://a38db84d334bb1ae612379c88129d14d14422aea1a4e6c8d5e3a4de4afd35891"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","containerID":"cri-o://1ea1584a50eaf2073fc08bf226a125955243b785667fd095cb8965bae60ab1da","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000002073115145477665031022 0ustar00000000000000002026-02-19T03:10:30.482534870Z I0219 03:10:30.482324 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc0006a5040 cert-dir:0xc0006a5220 cert-secrets:0xc0006a4fa0 configmaps:0xc0006a4b40 namespace:0xc0006a4960 optional-cert-configmaps:0xc0006a5180 optional-configmaps:0xc0006a4c80 optional-secrets:0xc0006a4be0 pod:0xc0006a4a00 pod-manifest-dir:0xc0006a4dc0 resource-dir:0xc0006a4d20 revision:0xc0006a48c0 secrets:0xc0006a4aa0 v:0xc0006a5c20] [0xc0006a5c20 0xc0006a48c0 0xc0006a4960 0xc0006a4a00 0xc0006a4d20 0xc0006a4dc0 0xc0006a4b40 0xc0006a4c80 0xc0006a4aa0 0xc0006a4be0 0xc0006a5220 0xc0006a5040 0xc0006a5180 0xc0006a4fa0] [] map[cert-configmaps:0xc0006a5040 cert-dir:0xc0006a5220 cert-secrets:0xc0006a4fa0 configmaps:0xc0006a4b40 help:0xc000c16140 kubeconfig:0xc0006a4820 log-flush-frequency:0xc0006a5b80 namespace:0xc0006a4960 optional-cert-configmaps:0xc0006a5180 optional-cert-secrets:0xc0006a50e0 optional-configmaps:0xc0006a4c80 optional-secrets:0xc0006a4be0 pod:0xc0006a4a00 pod-manifest-dir:0xc0006a4dc0 pod-manifests-lock-file:0xc0006a4f00 resource-dir:0xc0006a4d20 revision:0xc0006a48c0 secrets:0xc0006a4aa0 timeout-duration:0xc0006a4e60 v:0xc0006a5c20 vmodule:0xc0006a5cc0] [0xc0006a4820 0xc0006a48c0 0xc0006a4960 0xc0006a4a00 0xc0006a4aa0 0xc0006a4b40 0xc0006a4be0 0xc0006a4c80 0xc0006a4d20 0xc0006a4dc0 0xc0006a4e60 0xc0006a4f00 0xc0006a4fa0 0xc0006a5040 0xc0006a50e0 0xc0006a5180 0xc0006a5220 0xc0006a5b80 0xc0006a5c20 0xc0006a5cc0 0xc000c16140] [0xc0006a5040 0xc0006a5220 0xc0006a4fa0 0xc0006a4b40 0xc000c16140 0xc0006a4820 0xc0006a5b80 0xc0006a4960 0xc0006a5180 0xc0006a50e0 0xc0006a4c80 0xc0006a4be0 0xc0006a4a00 0xc0006a4dc0 0xc0006a4f00 0xc0006a4d20 0xc0006a48c0 0xc0006a4aa0 0xc0006a4e60 0xc0006a5c20 0xc0006a5cc0] map[104:0xc000c16140 118:0xc0006a5c20] [] -1 0 0xc000cd5170 true 0x77b500 []} 2026-02-19T03:10:30.482664304Z I0219 03:10:30.482530 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00048e1a0)({ 2026-02-19T03:10:30.482664304Z KubeConfig: (string) "", 2026-02-19T03:10:30.482664304Z KubeClient: (kubernetes.Interface) , 2026-02-19T03:10:30.482664304Z Revision: (string) (len=1) "2", 2026-02-19T03:10:30.482664304Z NodeName: (string) "", 2026-02-19T03:10:30.482664304Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-02-19T03:10:30.482664304Z Clock: (clock.RealClock) { 2026-02-19T03:10:30.482664304Z }, 2026-02-19T03:10:30.482664304Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-02-19T03:10:30.482664304Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-19T03:10:30.482664304Z (string) (len=27) "service-account-private-key", 2026-02-19T03:10:30.482664304Z (string) (len=31) "localhost-recovery-client-token" 2026-02-19T03:10:30.482664304Z }, 2026-02-19T03:10:30.482664304Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-19T03:10:30.482664304Z (string) (len=12) "serving-cert" 2026-02-19T03:10:30.482664304Z }, 2026-02-19T03:10:30.482664304Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-19T03:10:30.482664304Z (string) (len=27) "kube-controller-manager-pod", 2026-02-19T03:10:30.482664304Z (string) (len=6) "config", 2026-02-19T03:10:30.482664304Z (string) (len=32) "cluster-policy-controller-config", 2026-02-19T03:10:30.482664304Z (string) (len=29) "controller-manager-kubeconfig", 2026-02-19T03:10:30.482664304Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-02-19T03:10:30.482664304Z (string) (len=17) "serviceaccount-ca", 2026-02-19T03:10:30.482664304Z (string) (len=10) "service-ca", 2026-02-19T03:10:30.482664304Z (string) (len=15) "recycler-config" 2026-02-19T03:10:30.482664304Z }, 2026-02-19T03:10:30.482664304Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-19T03:10:30.482664304Z (string) (len=12) "cloud-config" 2026-02-19T03:10:30.482664304Z }, 2026-02-19T03:10:30.482664304Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-02-19T03:10:30.482664304Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-02-19T03:10:30.482664304Z (string) (len=10) "csr-signer" 2026-02-19T03:10:30.482664304Z }, 2026-02-19T03:10:30.482664304Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-19T03:10:30.482664304Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-19T03:10:30.482664304Z (string) (len=20) "aggregator-client-ca", 2026-02-19T03:10:30.482664304Z (string) (len=9) "client-ca" 2026-02-19T03:10:30.482664304Z }, 2026-02-19T03:10:30.482664304Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-19T03:10:30.482664304Z (string) (len=17) "trusted-ca-bundle" 2026-02-19T03:10:30.482664304Z }, 2026-02-19T03:10:30.482664304Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-02-19T03:10:30.482664304Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-19T03:10:30.482664304Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-19T03:10:30.482664304Z Timeout: (time.Duration) 2m0s, 2026-02-19T03:10:30.482664304Z StaticPodManifestsLockFile: (string) "", 2026-02-19T03:10:30.482664304Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-19T03:10:30.482664304Z KubeletVersion: (string) "" 2026-02-19T03:10:30.482664304Z }) 2026-02-19T03:10:30.483194890Z I0219 03:10:30.483172 1 cmd.go:413] Getting controller reference for node master-0 2026-02-19T03:10:30.490887355Z I0219 03:10:30.490842 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-19T03:10:30.490969837Z I0219 03:10:30.490928 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-19T03:10:30.490969837Z I0219 03:10:30.490944 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-19T03:10:30.493468310Z I0219 03:10:30.493440 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-19T03:11:00.494225469Z I0219 03:11:00.494114 1 cmd.go:524] Getting installer pods for node master-0 2026-02-19T03:11:00.500685058Z I0219 03:11:00.500617 1 cmd.go:542] Latest installer revision for node master-0 is: 2 2026-02-19T03:11:00.500685058Z I0219 03:11:00.500642 1 cmd.go:431] Querying kubelet version for node master-0 2026-02-19T03:11:00.504354405Z I0219 03:11:00.504292 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-02-19T03:11:00.504354405Z I0219 03:11:00.504328 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-02-19T03:11:00.504556131Z I0219 03:11:00.504518 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-02-19T03:11:00.504556131Z I0219 03:11:00.504546 1 cmd.go:229] Getting secrets ... 2026-02-19T03:11:14.505680968Z I0219 03:11:14.505563 1 copy.go:24] Failed to get secret openshift-kube-controller-manager/localhost-recovery-client-token-2: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/secrets/localhost-recovery-client-token-2?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:11:28.519412121Z I0219 03:11:28.519293 1 copy.go:24] Failed to get secret openshift-kube-controller-manager/localhost-recovery-client-token-2: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets localhost-recovery-client-token-2) 2026-02-19T03:11:42.572046955Z I0219 03:11:42.571971 1 copy.go:24] Failed to get secret openshift-kube-controller-manager/localhost-recovery-client-token-2: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets localhost-recovery-client-token-2) 2026-02-19T03:11:56.824907284Z I0219 03:11:56.824782 1 copy.go:24] Failed to get secret openshift-kube-controller-manager/localhost-recovery-client-token-2: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/secrets/localhost-recovery-client-token-2?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:11:56.830037373Z F0219 03:11:56.829976 1 cmd.go:109] failed to copy: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/secrets/localhost-recovery-client-token-2?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-controller-manager/installer-2-master-0.json0000640000000000000000000001704115145477665024507 0ustar0000000000000000{"metadata":{"name":"installer-2-master-0","namespace":"openshift-kube-controller-manager","uid":"d10d2e5a-c822-4f86-b6f1-2da4ee6cc9d4","resourceVersion":"9113","creationTimestamp":"2026-02-19T03:05:55Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.54/23\"],\"mac_address\":\"0a:58:0a:80:00:36\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.54/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.54\"\n ],\n \"mac\": \"0a:58:0a:80:00:36\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-2","uid":"84b46bf3-9456-49cf-8aa2-0dd6d78b4443"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=2","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:55Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:57Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:57Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:55Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.54","podIPs":[{"ip":"10.128.0.54"}],"startTime":"2026-02-19T03:05:55Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":" 1 cmd.go:431] Querying kubelet version for node master-0\nI0219 03:11:00.504292 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0\nI0219 03:11:00.504328 1 cmd.go:293] Creating target resource directory \"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2\" ...\nI0219 03:11:00.504518 1 cmd.go:221] Creating target resource directory \"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2\" ...\nI0219 03:11:00.504546 1 cmd.go:229] Getting secrets ...\nI0219 03:11:14.505563 1 copy.go:24] Failed to get secret openshift-kube-controller-manager/localhost-recovery-client-token-2: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/secrets/localhost-recovery-client-token-2?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nI0219 03:11:28.519293 1 copy.go:24] Failed to get secret openshift-kube-controller-manager/localhost-recovery-client-token-2: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets localhost-recovery-client-token-2)\nI0219 03:11:42.571971 1 copy.go:24] Failed to get secret openshift-kube-controller-manager/localhost-recovery-client-token-2: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets localhost-recovery-client-token-2)\nI0219 03:11:56.824782 1 copy.go:24] Failed to get secret openshift-kube-controller-manager/localhost-recovery-client-token-2: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/secrets/localhost-recovery-client-token-2?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0219 03:11:56.829976 1 cmd.go:109] failed to copy: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/secrets/localhost-recovery-client-token-2?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-19T03:10:29Z","finishedAt":"2026-02-19T03:11:56Z","containerID":"cri-o://ac0c6f1221931d6368270f9300d1e7df26e99f211f84672a8bd222a9935f47ac"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac","containerID":"cri-o://ac0c6f1221931d6368270f9300d1e7df26e99f211f84672a8bd222a9935f47ac","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002431715145477665027232 0ustar00000000000000002026-02-19T03:10:30.388426768Z I0219 03:10:30.387710 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc0008e6140 cert-dir:0xc0008e6320 cert-secrets:0xc0008e60a0 configmaps:0xc0007edb80 namespace:0xc0007ed9a0 optional-cert-configmaps:0xc0008e6280 optional-cert-secrets:0xc0008e61e0 optional-configmaps:0xc0007edcc0 optional-secrets:0xc0007edc20 pod:0xc0007eda40 pod-manifest-dir:0xc0007ede00 resource-dir:0xc0007edd60 revision:0xc0007ed900 secrets:0xc0007edae0 v:0xc0008e7720] [0xc0008e7720 0xc0007ed900 0xc0007ed9a0 0xc0007eda40 0xc0007edd60 0xc0007ede00 0xc0007edb80 0xc0007edcc0 0xc0007edae0 0xc0007edc20 0xc0008e6320 0xc0008e6140 0xc0008e6280 0xc0008e60a0 0xc0008e61e0] [] map[cert-configmaps:0xc0008e6140 cert-dir:0xc0008e6320 cert-secrets:0xc0008e60a0 configmaps:0xc0007edb80 help:0xc0008e7ae0 kubeconfig:0xc0007ed860 log-flush-frequency:0xc0008e7680 namespace:0xc0007ed9a0 optional-cert-configmaps:0xc0008e6280 optional-cert-secrets:0xc0008e61e0 optional-configmaps:0xc0007edcc0 optional-secrets:0xc0007edc20 pod:0xc0007eda40 pod-manifest-dir:0xc0007ede00 pod-manifests-lock-file:0xc0008e6000 resource-dir:0xc0007edd60 revision:0xc0007ed900 secrets:0xc0007edae0 timeout-duration:0xc0007edea0 v:0xc0008e7720 vmodule:0xc0008e77c0] [0xc0007ed860 0xc0007ed900 0xc0007ed9a0 0xc0007eda40 0xc0007edae0 0xc0007edb80 0xc0007edc20 0xc0007edcc0 0xc0007edd60 0xc0007ede00 0xc0007edea0 0xc0008e6000 0xc0008e60a0 0xc0008e6140 0xc0008e61e0 0xc0008e6280 0xc0008e6320 0xc0008e7680 0xc0008e7720 0xc0008e77c0 0xc0008e7ae0] [0xc0008e6140 0xc0008e6320 0xc0008e60a0 0xc0007edb80 0xc0008e7ae0 0xc0007ed860 0xc0008e7680 0xc0007ed9a0 0xc0008e6280 0xc0008e61e0 0xc0007edcc0 0xc0007edc20 0xc0007eda40 0xc0007ede00 0xc0008e6000 0xc0007edd60 0xc0007ed900 0xc0007edae0 0xc0007edea0 0xc0008e7720 0xc0008e77c0] map[104:0xc0008e7ae0 118:0xc0008e7720] [] -1 0 0xc0008bc5d0 true 0xae1c20 []} 2026-02-19T03:10:30.388426768Z I0219 03:10:30.387962 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0005c36c0)({ 2026-02-19T03:10:30.388426768Z KubeConfig: (string) "", 2026-02-19T03:10:30.388426768Z KubeClient: (kubernetes.Interface) , 2026-02-19T03:10:30.388426768Z Revision: (string) (len=1) "1", 2026-02-19T03:10:30.388426768Z NodeName: (string) "", 2026-02-19T03:10:30.388426768Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-02-19T03:10:30.388426768Z Clock: (clock.RealClock) { 2026-02-19T03:10:30.388426768Z }, 2026-02-19T03:10:30.388426768Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-02-19T03:10:30.388426768Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-19T03:10:30.388426768Z (string) (len=11) "etcd-client", 2026-02-19T03:10:30.388426768Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-02-19T03:10:30.388426768Z (string) (len=31) "localhost-recovery-client-token" 2026-02-19T03:10:30.388426768Z }, 2026-02-19T03:10:30.388426768Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-19T03:10:30.388426768Z (string) (len=17) "encryption-config", 2026-02-19T03:10:30.388426768Z (string) (len=21) "webhook-authenticator" 2026-02-19T03:10:30.388426768Z }, 2026-02-19T03:10:30.388426768Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-19T03:10:30.388426768Z (string) (len=18) "kube-apiserver-pod", 2026-02-19T03:10:30.388426768Z (string) (len=6) "config", 2026-02-19T03:10:30.388426768Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-02-19T03:10:30.388426768Z (string) (len=28) "bound-sa-token-signing-certs", 2026-02-19T03:10:30.388426768Z (string) (len=15) "etcd-serving-ca", 2026-02-19T03:10:30.388426768Z (string) (len=18) "kubelet-serving-ca", 2026-02-19T03:10:30.388426768Z (string) (len=22) "sa-token-signing-certs", 2026-02-19T03:10:30.388426768Z (string) (len=29) "kube-apiserver-audit-policies" 2026-02-19T03:10:30.388426768Z }, 2026-02-19T03:10:30.388426768Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-19T03:10:30.388426768Z (string) (len=14) "oauth-metadata", 2026-02-19T03:10:30.388426768Z (string) (len=12) "cloud-config", 2026-02-19T03:10:30.388426768Z (string) (len=24) "kube-apiserver-server-ca" 2026-02-19T03:10:30.388426768Z }, 2026-02-19T03:10:30.388426768Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-02-19T03:10:30.388426768Z (string) (len=17) "aggregator-client", 2026-02-19T03:10:30.388426768Z (string) (len=30) "localhost-serving-cert-certkey", 2026-02-19T03:10:30.388426768Z (string) (len=31) "service-network-serving-certkey", 2026-02-19T03:10:30.388426768Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-02-19T03:10:30.388426768Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-02-19T03:10:30.388426768Z (string) (len=33) "bound-service-account-signing-key", 2026-02-19T03:10:30.388426768Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-02-19T03:10:30.388426768Z (string) (len=31) "check-endpoints-client-cert-key", 2026-02-19T03:10:30.388426768Z (string) (len=14) "kubelet-client", 2026-02-19T03:10:30.388426768Z (string) (len=16) "node-kubeconfigs" 2026-02-19T03:10:30.388426768Z }, 2026-02-19T03:10:30.388426768Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-02-19T03:10:30.388426768Z (string) (len=17) "user-serving-cert", 2026-02-19T03:10:30.388426768Z (string) (len=21) "user-serving-cert-000", 2026-02-19T03:10:30.388426768Z (string) (len=21) "user-serving-cert-001", 2026-02-19T03:10:30.388426768Z (string) (len=21) "user-serving-cert-002", 2026-02-19T03:10:30.388426768Z (string) (len=21) "user-serving-cert-003", 2026-02-19T03:10:30.388426768Z (string) (len=21) "user-serving-cert-004", 2026-02-19T03:10:30.388426768Z (string) (len=21) "user-serving-cert-005", 2026-02-19T03:10:30.388426768Z (string) (len=21) "user-serving-cert-006", 2026-02-19T03:10:30.388426768Z (string) (len=21) "user-serving-cert-007", 2026-02-19T03:10:30.388426768Z (string) (len=21) "user-serving-cert-008", 2026-02-19T03:10:30.388426768Z (string) (len=21) "user-serving-cert-009" 2026-02-19T03:10:30.388426768Z }, 2026-02-19T03:10:30.388426768Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-19T03:10:30.388426768Z (string) (len=20) "aggregator-client-ca", 2026-02-19T03:10:30.388426768Z (string) (len=9) "client-ca", 2026-02-19T03:10:30.388426768Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-19T03:10:30.388426768Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-19T03:10:30.388426768Z }, 2026-02-19T03:10:30.388426768Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-19T03:10:30.388426768Z (string) (len=17) "trusted-ca-bundle" 2026-02-19T03:10:30.388426768Z }, 2026-02-19T03:10:30.388426768Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-19T03:10:30.388426768Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-19T03:10:30.388426768Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-19T03:10:30.388426768Z Timeout: (time.Duration) 2m0s, 2026-02-19T03:10:30.388426768Z StaticPodManifestsLockFile: (string) "", 2026-02-19T03:10:30.388426768Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-19T03:10:30.388426768Z KubeletVersion: (string) "" 2026-02-19T03:10:30.388426768Z }) 2026-02-19T03:10:30.388682956Z I0219 03:10:30.388645 1 cmd.go:413] Getting controller reference for node master-0 2026-02-19T03:10:30.400309586Z I0219 03:10:30.400238 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-19T03:10:30.400364967Z I0219 03:10:30.400337 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-19T03:10:30.400364967Z I0219 03:10:30.400360 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-19T03:10:30.402807409Z I0219 03:10:30.402766 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-19T03:11:00.403966080Z I0219 03:11:00.403763 1 cmd.go:524] Getting installer pods for node master-0 2026-02-19T03:11:00.408070240Z I0219 03:11:00.407995 1 cmd.go:542] Latest installer revision for node master-0 is: 1 2026-02-19T03:11:00.408070240Z I0219 03:11:00.408032 1 cmd.go:431] Querying kubelet version for node master-0 2026-02-19T03:11:00.411940543Z I0219 03:11:00.411880 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-02-19T03:11:00.411940543Z I0219 03:11:00.411919 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-apiserver-pod-1" ... 2026-02-19T03:11:00.412117888Z I0219 03:11:00.412067 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-apiserver-pod-1" ... 2026-02-19T03:11:00.412117888Z I0219 03:11:00.412096 1 cmd.go:229] Getting secrets ... 2026-02-19T03:11:14.413282326Z I0219 03:11:14.413202 1 copy.go:24] Failed to get secret openshift-kube-apiserver/etcd-client-1: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client-1) 2026-02-19T03:11:28.425086162Z I0219 03:11:28.424871 1 copy.go:24] Failed to get secret openshift-kube-apiserver/etcd-client-1: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/etcd-client-1?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:11:42.480014359Z I0219 03:11:42.479953 1 copy.go:24] Failed to get secret openshift-kube-apiserver/etcd-client-1: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client-1) 2026-02-19T03:11:56.736323508Z I0219 03:11:56.736147 1 copy.go:24] Failed to get secret openshift-kube-apiserver/etcd-client-1: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/etcd-client-1?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-19T03:11:56.747475782Z F0219 03:11:56.747369 1 cmd.go:109] failed to copy: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/etcd-client-1?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002120715145477665022712 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"1bddb3a1-41bd-4314-bfb0-3c72ca14200f","resourceVersion":"9111","creationTimestamp":"2026-02-19T03:05:49Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.52/23\"],\"mac_address\":\"0a:58:0a:80:00:34\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.52/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.52\"\n ],\n \"mac\": \"0a:58:0a:80:00:34\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"63d1b6c1-89d2-4f30-8e69-319c057c497d"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:49Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:57Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:57Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:49Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.52","podIPs":[{"ip":"10.128.0.52"}],"startTime":"2026-02-19T03:05:49Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"additional period after revisions have settled for node master-0\nI0219 03:11:00.403763 1 cmd.go:524] Getting installer pods for node master-0\nI0219 03:11:00.407995 1 cmd.go:542] Latest installer revision for node master-0 is: 1\nI0219 03:11:00.408032 1 cmd.go:431] Querying kubelet version for node master-0\nI0219 03:11:00.411880 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0\nI0219 03:11:00.411919 1 cmd.go:293] Creating target resource directory \"/etc/kubernetes/static-pod-resources/kube-apiserver-pod-1\" ...\nI0219 03:11:00.412067 1 cmd.go:221] Creating target resource directory \"/etc/kubernetes/static-pod-resources/kube-apiserver-pod-1\" ...\nI0219 03:11:00.412096 1 cmd.go:229] Getting secrets ...\nI0219 03:11:14.413202 1 copy.go:24] Failed to get secret openshift-kube-apiserver/etcd-client-1: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client-1)\nI0219 03:11:28.424871 1 copy.go:24] Failed to get secret openshift-kube-apiserver/etcd-client-1: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/etcd-client-1?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nI0219 03:11:42.479953 1 copy.go:24] Failed to get secret openshift-kube-apiserver/etcd-client-1: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client-1)\nI0219 03:11:56.736147 1 copy.go:24] Failed to get secret openshift-kube-apiserver/etcd-client-1: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/etcd-client-1?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0219 03:11:56.747369 1 cmd.go:109] failed to copy: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/etcd-client-1?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-19T03:10:29Z","finishedAt":"2026-02-19T03:11:56Z","containerID":"cri-o://a7cd657859866d0c60a8c29ef7e8c20807d578f39873e49c5149373c208aeee5"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","containerID":"cri-o://a7cd657859866d0c60a8c29ef7e8c20807d578f39873e49c5149373c208aeee5","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615145477665036007 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-19T03:03:11.826566077Z I0219 03:03:11.826315 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010464515145477665032711 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-19T03:12:37.415799145Z I0219 03:12:37.415727 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:37.474147472Z I0219 03:12:37.474075 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:37.474778450Z I0219 03:12:37.474747 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:37.615688268Z I0219 03:12:37.615624 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:37.670126101Z I0219 03:12:37.670054 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:37.671620965Z I0219 03:12:37.671585 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:37.816023494Z I0219 03:12:37.815959 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:37.869100508Z I0219 03:12:37.869047 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:37.871111046Z I0219 03:12:37.871067 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.015347051Z I0219 03:12:38.015288 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.069245798Z I0219 03:12:38.069186 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.070976828Z I0219 03:12:38.070947 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.215793689Z I0219 03:12:38.215723 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.271477008Z I0219 03:12:38.271343 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.272211549Z I0219 03:12:38.272058 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.405126755Z I0219 03:12:38.405069 1 cacher.go:1017] cacher (machineconfigs.machineconfiguration.openshift.io): 1 objects queued in incoming channel. 2026-02-19T03:12:38.405126755Z I0219 03:12:38.405097 1 cacher.go:1017] cacher (machineconfigs.machineconfiguration.openshift.io): 2 objects queued in incoming channel. 2026-02-19T03:12:38.416197927Z I0219 03:12:38.416144 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.469419994Z I0219 03:12:38.469309 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.472901866Z I0219 03:12:38.472857 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.616652296Z I0219 03:12:38.616570 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.669784741Z I0219 03:12:38.669701 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.670891923Z I0219 03:12:38.670834 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.815645903Z I0219 03:12:38.815574 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.870151728Z I0219 03:12:38.870095 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:38.870870459Z I0219 03:12:38.870836 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.016994098Z I0219 03:12:39.016698 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.069701321Z I0219 03:12:39.069611 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.070768812Z I0219 03:12:39.070732 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.218213370Z I0219 03:12:39.216476 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.270953404Z I0219 03:12:39.270879 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.271499449Z I0219 03:12:39.271453 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.416816175Z I0219 03:12:39.416731 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.469761205Z I0219 03:12:39.469713 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.471604309Z I0219 03:12:39.470988 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.615992218Z I0219 03:12:39.615929 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.669546735Z I0219 03:12:39.669481 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.671927224Z I0219 03:12:39.671556 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.816367565Z I0219 03:12:39.816313 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.870457708Z I0219 03:12:39.870406 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:39.870581811Z I0219 03:12:39.870547 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.016709721Z I0219 03:12:40.016655 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.070434433Z I0219 03:12:40.070318 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.070780493Z I0219 03:12:40.070753 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.192169303Z E0219 03:12:40.192112 1 remote_available_controller.go:470] "Unhandled Error" err="v1.quota.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/quota.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.192207264Z E0219 03:12:40.192180 1 remote_available_controller.go:470] "Unhandled Error" err="v1.apps.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/apps.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.192331738Z E0219 03:12:40.192305 1 remote_available_controller.go:470] "Unhandled Error" err="v1.template.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/template.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.199090215Z E0219 03:12:40.199048 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.64:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.64:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.199154856Z E0219 03:12:40.199105 1 remote_available_controller.go:470] "Unhandled Error" err="v1.authorization.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.199154856Z E0219 03:12:40.199063 1 remote_available_controller.go:470] "Unhandled Error" err="v1.image.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/image.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.199174427Z E0219 03:12:40.199152 1 remote_available_controller.go:470] "Unhandled Error" err="v1.project.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/project.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.205329836Z E0219 03:12:40.203407 1 remote_available_controller.go:470] "Unhandled Error" err="v1.oauth.openshift.io failed with: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.205329836Z E0219 03:12:40.203524 1 remote_available_controller.go:470] "Unhandled Error" err="v1.user.openshift.io failed with: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.209247950Z E0219 03:12:40.209200 1 remote_available_controller.go:470] "Unhandled Error" err="v1.build.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/build.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.209284781Z E0219 03:12:40.209268 1 remote_available_controller.go:470] "Unhandled Error" err="v1.security.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/security.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.209405554Z E0219 03:12:40.209378 1 remote_available_controller.go:470] "Unhandled Error" err="v1.route.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/route.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:40.216201852Z I0219 03:12:40.216148 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.269848062Z I0219 03:12:40.269799 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.271009626Z I0219 03:12:40.270987 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.301767720Z I0219 03:12:40.301668 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=5 seatDemandAvg=0.08485944412754624 seatDemandStdev=0.31548884662856574 seatDemandSmoothed=21.677945557876527 fairFrac=2.331974373907979 currentCL=5 concurrencyDenominator=5 backstop=false 2026-02-19T03:12:40.415784536Z I0219 03:12:40.415710 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.471113485Z I0219 03:12:40.471027 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.472248058Z I0219 03:12:40.472190 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.616892345Z I0219 03:12:40.615526 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.670104422Z I0219 03:12:40.670020 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.671597995Z I0219 03:12:40.671532 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.815569142Z I0219 03:12:40.815503 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.869188572Z I0219 03:12:40.869127 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:40.871563311Z I0219 03:12:40.871518 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:41.015658781Z I0219 03:12:41.015588 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:41.071072282Z I0219 03:12:41.070995 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:41.215551874Z I0219 03:12:41.215434 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:41.241677184Z E0219 03:12:41.241617 1 remote_available_controller.go:470] "Unhandled Error" err="v1.template.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/template.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:41.271318786Z I0219 03:12:41.271204 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:41.416310442Z I0219 03:12:41.416234 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:41.471273131Z I0219 03:12:41.471184 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:41.616425982Z I0219 03:12:41.616371 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:41.671208375Z I0219 03:12:41.671133 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:41.966273265Z I0219 03:12:41.966205 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:42.071571047Z I0219 03:12:42.071488 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:42.100589301Z E0219 03:12:42.100535 1 remote_available_controller.go:470] "Unhandled Error" err="v1.apps.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/apps.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:42.172955785Z E0219 03:12:42.172804 1 remote_available_controller.go:470] "Unhandled Error" err="v1.image.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/image.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:42.271048268Z I0219 03:12:42.270974 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:42.335136332Z E0219 03:12:42.334903 1 remote_available_controller.go:470] "Unhandled Error" err="v1.packages.operators.coreos.com failed with: failing or missing response from https://10.128.0.64:5443/apis/packages.operators.coreos.com/v1: bad status from https://10.128.0.64:5443/apis/packages.operators.coreos.com/v1: 401" logger="UnhandledError" 2026-02-19T03:12:42.471759695Z I0219 03:12:42.471395 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:42.671749050Z I0219 03:12:42.671685 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:42.870995525Z I0219 03:12:42.870951 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:43.071364732Z I0219 03:12:43.071183 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:43.106894755Z E0219 03:12:43.106807 1 remote_available_controller.go:470] "Unhandled Error" err="v1.authorization.openshift.io failed with: failing or missing response from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: 401" logger="UnhandledError" 2026-02-19T03:12:43.271234084Z I0219 03:12:43.271150 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:43.471604561Z I0219 03:12:43.471299 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:43.671953967Z I0219 03:12:43.671557 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:43.871563282Z I0219 03:12:43.871488 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-19T03:12:44.316871942Z I0219 03:12:44.316742 1 trace.go:236] Trace[666134590]: "Create" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:2a513a40-5cba-4389-92bd-77cb29657cb2,client:192.168.32.10,api-group:rbac.authorization.k8s.io,api-version:v1,name:,subresource:,namespace:openshift-console-operator,protocol:HTTP/2.0,resource:roles,scope:resource,url:/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-console-operator/roles,user-agent:cluster-version-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:POST (19-Feb-2026 03:12:43.812) (total time: 504ms): 2026-02-19T03:12:44.316871942Z Trace[666134590]: ---"Write to database call failed" len:523,err:namespaces "openshift-console-operator" not found 504ms (03:12:44.316) 2026-02-19T03:12:44.316871942Z Trace[666134590]: [504.610285ms] [504.610285ms] END 2026-02-19T03:12:44.389395101Z I0219 03:12:44.389169 1 trace.go:236] Trace[1071580286]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:1f3022f8-204a-4b0c-bd67-0c75f3fd0c0d,client:10.128.0.58,api-group:,api-version:v1,name:bootstrap-kube-apiserver-master-0,subresource:log,namespace:openshift-kube-apiserver,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-kube-apiserver/pods/bootstrap-kube-apiserver-master-0/log,user-agent:insights-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:CONNECT (19-Feb-2026 03:12:43.871) (total time: 517ms): 2026-02-19T03:12:44.389395101Z Trace[1071580286]: ---"About to write a response" 510ms (03:12:44.382) 2026-02-19T03:12:44.389395101Z Trace[1071580286]: [517.369725ms] [517.369725ms] END 2026-02-19T03:12:44.391372558Z I0219 03:12:44.391313 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015145477665031167 0ustar00000000000000002026-02-19T03:03:07.908340374Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115145477665037174 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-5d87bf58c-lbfvq2026-02-19T03:11:34.200518714Z I0219 03:11:34.200329 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:11:34.200518714Z I0219 03:11:34.200454 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:11:34.200915376Z I0219 03:11:34.200863 1 observer_polling.go:159] Starting file observer 2026-02-19T03:11:34.221890799Z I0219 03:11:34.221797 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601302238.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-19T03:11:34.555771254Z I0219 03:11:34.555667 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:11:34.555771254Z W0219 03:11:34.555711 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:34.555771254Z W0219 03:11:34.555720 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:34.555771254Z W0219 03:11:34.555727 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:11:34.555771254Z W0219 03:11:34.555732 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:11:34.555771254Z W0219 03:11:34.555736 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:11:34.555771254Z W0219 03:11:34.555742 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:11:34.558682909Z I0219 03:11:34.558598 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-19T03:11:34.558995328Z I0219 03:11:34.558951 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-02-19T03:11:34.558995328Z I0219 03:11:34.558946 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:11:34.559045749Z I0219 03:11:34.559012 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:34.559045749Z I0219 03:11:34.559015 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:11:34.559045749Z I0219 03:11:34.559032 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:34.559066310Z I0219 03:11:34.558885 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-19T03:11:34.559076380Z I0219 03:11:34.559064 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:11:34.559403880Z I0219 03:11:34.559331 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:11:34.560488952Z I0219 03:11:34.559620 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-19T03:11:34.560488952Z I0219 03:11:34.559675 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:11:34.659570579Z I0219 03:11:34.659488 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-19T03:11:34.659614100Z I0219 03:11:34.659553 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:34.659667242Z I0219 03:11:34.659623 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file kube-apiserver-operator_previous.log0000640000000000000000000000176115145477665037375 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-5d87bf58c-lbfvq2026-02-19T03:09:52.498305660Z I0219 03:09:52.496611 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:09:52.498305660Z I0219 03:09:52.496748 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:09:52.498305660Z I0219 03:09:52.497335 1 observer_polling.go:159] Starting file observer 2026-02-19T03:10:35.938302944Z I0219 03:10:35.935831 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601302238.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-19T03:11:06.278682312Z F0219 03:11:06.278585 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-apiserver-operator/leases/kube-apiserver-operator-lock": context deadline exceeded config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-5d87bf58c-lbfvq.json0000640000000000000000000001537415145477665030174 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-5d87bf58c-lbfvq","generateName":"kube-apiserver-operator-5d87bf58c-","namespace":"openshift-kube-apiserver-operator","uid":"4714ef51-2d24-4938-8c58-80c1485a368b","resourceVersion":"8637","creationTimestamp":"2026-02-19T03:03:33Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"5d87bf58c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-5d87bf58c","uid":"335ce65d-e403-489d-baca-2b5e93d9aab3","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:50Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2026-02-19T03:04:48Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-02-19T03:11:34Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0219 03:09:52.496611 1 cmd.go:253] Using service-serving-cert provided certificates\nI0219 03:09:52.496748 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0219 03:09:52.497335 1 observer_polling.go:159] Starting file observer\nI0219 03:10:35.935831 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601302238.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af\nF0219 03:11:06.278585 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-apiserver-operator/leases/kube-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-19T03:09:52Z","finishedAt":"2026-02-19T03:11:06Z","containerID":"cri-o://61d4c7db9949cabb346e6b5c6f267c3cd30095b418d6916ce487053c09f5bbd9"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","containerID":"cri-o://49ac40cd49fe9f544ea18cf9db242f3b1d372ceb484dc7cc80e9da742f93d130","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007420415145477665025225 0ustar00000000000000002026-02-19T03:05:56.579433785Z 2026-02-19T03:05:56.579433785Z cluster-etcd-operator rev \ 2026-02-19T03:05:56.579433785Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-02-19T03:05:56.579433785Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-02-19T03:05:56.579433785Z --client-key-file=$(ETCDCTL_KEY) \ 2026-02-19T03:05:56.579433785Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-02-19T03:05:56.579433785Z securityContext: 2026-02-19T03:05:56.579433785Z privileged: true 2026-02-19T03:05:56.579433785Z resources: 2026-02-19T03:05:56.579433785Z requests: 2026-02-19T03:05:56.579433785Z memory: 50Mi 2026-02-19T03:05:56.579433785Z cpu: 10m 2026-02-19T03:05:56.579433785Z env: 2026-02-19T03:05:56.579433785Z - name: "ALL_ETCD_ENDPOINTS" 2026-02-19T03:05:56.579433785Z value: "https://192.168.32.10:2379" 2026-02-19T03:05:56.579433785Z - name: "ETCDCTL_API" 2026-02-19T03:05:56.579433785Z value: "3" 2026-02-19T03:05:56.579433785Z - name: "ETCDCTL_CACERT" 2026-02-19T03:05:56.579433785Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-02-19T03:05:56.579433785Z - name: "ETCDCTL_CERT" 2026-02-19T03:05:56.579433785Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-02-19T03:05:56.579433785Z - name: "ETCDCTL_ENDPOINTS" 2026-02-19T03:05:56.579433785Z value: "https://192.168.32.10:2379" 2026-02-19T03:05:56.579433785Z - name: "ETCDCTL_KEY" 2026-02-19T03:05:56.579433785Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-02-19T03:05:56.579433785Z - name: "ETCD_CIPHER_SUITES" 2026-02-19T03:05:56.579433785Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-02-19T03:05:56.579433785Z - name: "ETCD_DATA_DIR" 2026-02-19T03:05:56.579433785Z value: "/var/lib/etcd" 2026-02-19T03:05:56.579433785Z - name: "ETCD_ELECTION_TIMEOUT" 2026-02-19T03:05:56.579433785Z value: "2500" 2026-02-19T03:05:56.579433785Z - name: "ETCD_ENABLE_PPROF" 2026-02-19T03:05:56.579533868Z value: "true" 2026-02-19T03:05:56.579533868Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-02-19T03:05:56.579533868Z value: "1" 2026-02-19T03:05:56.579533868Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-02-19T03:05:56.579533868Z value: "200ms" 2026-02-19T03:05:56.579533868Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-02-19T03:05:56.579533868Z value: "5s" 2026-02-19T03:05:56.579533868Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-02-19T03:05:56.579533868Z value: "500" 2026-02-19T03:05:56.579533868Z - name: "ETCD_IMAGE" 2026-02-19T03:05:56.579533868Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef" 2026-02-19T03:05:56.579533868Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-02-19T03:05:56.579533868Z value: "existing" 2026-02-19T03:05:56.579533868Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-02-19T03:05:56.579533868Z value: "8589934592" 2026-02-19T03:05:56.579533868Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-02-19T03:05:56.579533868Z value: "true" 2026-02-19T03:05:56.579533868Z - name: "ETCD_TLS_MIN_VERSION" 2026-02-19T03:05:56.579533868Z value: "TLS1.2" 2026-02-19T03:05:56.579533868Z - name: "NODE_master_0_ETCD_NAME" 2026-02-19T03:05:56.579533868Z value: "master-0" 2026-02-19T03:05:56.579533868Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-02-19T03:05:56.579533868Z value: "192.168.32.10" 2026-02-19T03:05:56.579533868Z - name: "NODE_master_0_IP" 2026-02-19T03:05:56.579533868Z value: "192.168.32.10" 2026-02-19T03:05:56.579533868Z volumeMounts: 2026-02-19T03:05:56.579533868Z - mountPath: /var/lib/etcd 2026-02-19T03:05:56.579533868Z name: data-dir 2026-02-19T03:05:56.579533868Z - mountPath: /etc/kubernetes/static-pod-certs 2026-02-19T03:05:56.579533868Z name: cert-dir 2026-02-19T03:05:56.579533868Z hostNetwork: true 2026-02-19T03:05:56.579533868Z priorityClassName: system-node-critical 2026-02-19T03:05:56.579533868Z tolerations: 2026-02-19T03:05:56.579533868Z - operator: "Exists" 2026-02-19T03:05:56.579533868Z volumes: 2026-02-19T03:05:56.579533868Z - hostPath: 2026-02-19T03:05:56.579533868Z path: /etc/kubernetes/manifests 2026-02-19T03:05:56.579533868Z name: static-pod-dir 2026-02-19T03:05:56.579533868Z - hostPath: 2026-02-19T03:05:56.579533868Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-02-19T03:05:56.579533868Z name: resource-dir 2026-02-19T03:05:56.579533868Z - hostPath: 2026-02-19T03:05:56.579533868Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-02-19T03:05:56.579533868Z name: cert-dir 2026-02-19T03:05:56.579533868Z - hostPath: 2026-02-19T03:05:56.579533868Z path: /var/lib/etcd 2026-02-19T03:05:56.579533868Z type: "" 2026-02-19T03:05:56.579533868Z name: data-dir 2026-02-19T03:05:56.579533868Z - hostPath: 2026-02-19T03:05:56.579533868Z path: /usr/local/bin 2026-02-19T03:05:56.579533868Z name: usr-local-bin 2026-02-19T03:05:56.579533868Z - hostPath: 2026-02-19T03:05:56.579533868Z path: /var/log/etcd 2026-02-19T03:05:56.579533868Z name: log-dir 2026-02-19T03:05:56.579533868Z - hostPath: 2026-02-19T03:05:56.579533868Z path: /etc/kubernetes 2026-02-19T03:05:56.579533868Z name: config-dir 2026-02-19T03:05:56.579533868Z - hostPath: 2026-02-19T03:05:56.579533868Z path: /var/lib/etcd-auto-backup 2026-02-19T03:05:56.579533868Z name: etcd-auto-backup-dir 2026-02-19T03:05:56.596726229Z I0219 03:05:56.596660 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-02-19T03:05:56.596962786Z I0219 03:05:56.596928 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-19T03:05:56.596962786Z I0219 03:05:56.596940 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-02-19T03:05:56.596962786Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2026-02-19T03:06:10.657045287Z W0219 03:06:10.656802 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.189586e7571a1aba.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:2561caa0-5f79-496e-8fa7-a9692dca20be,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-02-19 03:05:56.597054138 +0000 UTC m=+30.910523799,LastTimestamp:2026-02-19 03:05:56.597054138 +0000 UTC m=+30.910523799,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: the server was unable to return a response in the time allotted, but may still be processing the request (post events) config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615145477665023520 0ustar00000000000000002026-02-19T03:10:16.388981089Z I0219 03:10:16.388609 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215145477665024215 0ustar00000000000000002026-02-19T03:10:06.086175142Z I0219 03:10:06.085933 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-02-19T03:10:19.649076558Z I0219 03:10:19.648978 1 etcdcli_pool.go:70] creating a new cached client 2026-02-19T03:10:29.649624052Z I0219 03:10:29.649552 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615145477665024374 0ustar00000000000000002026-02-19T03:10:05.798555891Z {"level":"info","ts":"2026-02-19T03:10:05.798400Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-02-19T03:10:05.799144978Z {"level":"info","ts":"2026-02-19T03:10:05.799117Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-02-19T03:10:05.799374105Z {"level":"info","ts":"2026-02-19T03:10:05.799347Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-02-19T03:10:05.799482928Z {"level":"info","ts":"2026-02-19T03:10:05.799448Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-02-19T03:10:05.799532099Z {"level":"info","ts":"2026-02-19T03:10:05.799515Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc00021e000/192.168.32.10:9978\""} 2026-02-19T03:10:05.799583101Z {"level":"info","ts":"2026-02-19T03:10:05.799565Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc00021e000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-02-19T03:10:05.799616452Z {"level":"info","ts":"2026-02-19T03:10:05.799600Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-02-19T03:10:05.799911530Z {"level":"info","ts":"2026-02-19T03:10:05.799881Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-02-19T03:10:05.800006673Z {"level":"info","ts":"2026-02-19T03:10:05.799963Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-02-19T03:10:05.800095146Z {"level":"info","ts":"2026-02-19T03:10:05.800071Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc000616b20 } }"} 2026-02-19T03:10:05.800144607Z {"level":"info","ts":"2026-02-19T03:10:05.800126Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-02-19T03:10:05.800200859Z {"level":"info","ts":"2026-02-19T03:10:05.800179Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-02-19T03:10:05.800251170Z {"level":"info","ts":"2026-02-19T03:10:05.800235Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-02-19T03:10:05.800573120Z {"level":"info","ts":"2026-02-19T03:10:05.800275Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-19T03:10:05.800785556Z {"level":"info","ts":"2026-02-19T03:10:05.800722Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, CONNECTING"} 2026-02-19T03:10:05.800904609Z {"level":"info","ts":"2026-02-19T03:10:05.800617Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-19T03:10:05.801943260Z {"level":"info","ts":"2026-02-19T03:10:05.801314Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:05.802084174Z {"level":"warn","ts":"2026-02-19T03:10:05.801956Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:05.802152356Z {"level":"info","ts":"2026-02-19T03:10:05.802082Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:05.802292410Z {"level":"info","ts":"2026-02-19T03:10:05.802198Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, TRANSIENT_FAILURE"} 2026-02-19T03:10:05.802338191Z {"level":"info","ts":"2026-02-19T03:10:05.802304Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-02-19T03:10:05.803967109Z {"level":"info","ts":"2026-02-19T03:10:05.802959Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-02-19T03:10:05.804033021Z {"level":"info","ts":"2026-02-19T03:10:05.803991Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-02-19T03:10:05.804250217Z {"level":"info","ts":"2026-02-19T03:10:05.804182Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-02-19T03:10:05.804250217Z {"level":"info","ts":"2026-02-19T03:10:05.804218Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-02-19T03:10:05.804250217Z {"level":"info","ts":"2026-02-19T03:10:05.804232Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-02-19T03:10:05.804308359Z {"level":"info","ts":"2026-02-19T03:10:05.804243Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-02-19T03:10:05.804620048Z {"level":"info","ts":"2026-02-19T03:10:05.804547Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-02-19T03:10:06.802623105Z {"level":"info","ts":"2026-02-19T03:10:06.802424Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:06.802623105Z {"level":"info","ts":"2026-02-19T03:10:06.802530Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, IDLE"} 2026-02-19T03:10:06.802733788Z {"level":"info","ts":"2026-02-19T03:10:06.802590Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-19T03:10:06.802733788Z {"level":"info","ts":"2026-02-19T03:10:06.802639Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-19T03:10:06.802853592Z {"level":"info","ts":"2026-02-19T03:10:06.802749Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, CONNECTING"} 2026-02-19T03:10:06.803040667Z {"level":"info","ts":"2026-02-19T03:10:06.802966Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:06.803040667Z {"level":"warn","ts":"2026-02-19T03:10:06.803006Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:06.803113939Z {"level":"info","ts":"2026-02-19T03:10:06.803043Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:06.803134160Z {"level":"info","ts":"2026-02-19T03:10:06.803111Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, TRANSIENT_FAILURE"} 2026-02-19T03:10:08.545229376Z {"level":"info","ts":"2026-02-19T03:10:08.545038Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:08.545229376Z {"level":"info","ts":"2026-02-19T03:10:08.545145Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, IDLE"} 2026-02-19T03:10:08.545343029Z {"level":"info","ts":"2026-02-19T03:10:08.545191Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-19T03:10:08.545343029Z {"level":"info","ts":"2026-02-19T03:10:08.545244Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-19T03:10:08.545443292Z {"level":"info","ts":"2026-02-19T03:10:08.545369Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, CONNECTING"} 2026-02-19T03:10:08.545845284Z {"level":"info","ts":"2026-02-19T03:10:08.545753Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:08.545845284Z {"level":"warn","ts":"2026-02-19T03:10:08.545814Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:08.545897695Z {"level":"info","ts":"2026-02-19T03:10:08.545846Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:08.545897695Z {"level":"info","ts":"2026-02-19T03:10:08.545879Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, TRANSIENT_FAILURE"} 2026-02-19T03:10:11.456053569Z {"level":"info","ts":"2026-02-19T03:10:11.455902Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:11.456053569Z {"level":"info","ts":"2026-02-19T03:10:11.455966Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, IDLE"} 2026-02-19T03:10:11.456053569Z {"level":"info","ts":"2026-02-19T03:10:11.456000Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-19T03:10:11.456117251Z {"level":"info","ts":"2026-02-19T03:10:11.456044Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-19T03:10:11.456243325Z {"level":"info","ts":"2026-02-19T03:10:11.456199Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, CONNECTING"} 2026-02-19T03:10:11.456668067Z {"level":"info","ts":"2026-02-19T03:10:11.456471Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:11.456668067Z {"level":"warn","ts":"2026-02-19T03:10:11.456535Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:11.456668067Z {"level":"info","ts":"2026-02-19T03:10:11.456575Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:11.456668067Z {"level":"info","ts":"2026-02-19T03:10:11.456614Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, TRANSIENT_FAILURE"} 2026-02-19T03:10:14.819362858Z {"level":"info","ts":"2026-02-19T03:10:14.819096Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-02-19T03:10:14.819362858Z {"level":"info","ts":"2026-02-19T03:10:14.819168Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, IDLE"} 2026-02-19T03:10:14.819362858Z {"level":"info","ts":"2026-02-19T03:10:14.819202Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-02-19T03:10:14.819362858Z {"level":"info","ts":"2026-02-19T03:10:14.819241Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-02-19T03:10:14.819515652Z {"level":"info","ts":"2026-02-19T03:10:14.819454Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, CONNECTING"} 2026-02-19T03:10:14.830556885Z {"level":"info","ts":"2026-02-19T03:10:14.830469Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-02-19T03:10:14.830683449Z {"level":"info","ts":"2026-02-19T03:10:14.830650Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000224240, READY"} 2026-02-19T03:10:14.830799902Z {"level":"info","ts":"2026-02-19T03:10:14.830767Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-02-19T03:10:14.830873844Z {"level":"info","ts":"2026-02-19T03:10:14.830847Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000011632415145477665022733 0ustar00000000000000002026-02-19T03:10:12.897719390Z {"level":"info","ts":"2026-02-19T03:10:12.897705Z","caller":"fileutil/purge.go:50","msg":"started to purge file","dir":"/var/lib/etcd/member/snap","suffix":"snap","max":5,"interval":"30s"} 2026-02-19T03:10:12.897719390Z {"level":"info","ts":"2026-02-19T03:10:12.897713Z","caller":"fileutil/purge.go:50","msg":"started to purge file","dir":"/var/lib/etcd/member/wal","suffix":"wal","max":5,"interval":"30s"} 2026-02-19T03:10:12.898034359Z {"level":"info","ts":"2026-02-19T03:10:12.897960Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 switched to configuration voters=(10514648578690414096)"} 2026-02-19T03:10:12.898098671Z {"level":"info","ts":"2026-02-19T03:10:12.898057Z","caller":"membership/cluster.go:421","msg":"added member","cluster-id":"a3c29fbf00fc418e","local-member-id":"91eb892c5ee87610","added-peer-id":"91eb892c5ee87610","added-peer-peer-urls":["https://192.168.32.10:2380"],"added-peer-is-learner":false} 2026-02-19T03:10:12.898206074Z {"level":"info","ts":"2026-02-19T03:10:12.898173Z","caller":"membership/cluster.go:587","msg":"set initial cluster version","cluster-id":"a3c29fbf00fc418e","local-member-id":"91eb892c5ee87610","cluster-version":"3.5"} 2026-02-19T03:10:12.898213854Z {"level":"info","ts":"2026-02-19T03:10:12.898204Z","caller":"api/capability.go:75","msg":"enabled capabilities for version","cluster-version":"3.5"} 2026-02-19T03:10:12.898642097Z {"level":"info","ts":"2026-02-19T03:10:12.898599Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} 2026-02-19T03:10:12.901547292Z {"level":"info","ts":"2026-02-19T03:10:12.901488Z","caller":"embed/etcd.go:765","msg":"starting with client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = true, crl-file = ","cipher-suites":["TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_CHACHA20_POLY1305_SHA256","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"]} 2026-02-19T03:10:12.901666875Z {"level":"info","ts":"2026-02-19T03:10:12.901610Z","caller":"embed/etcd.go:636","msg":"serving peer traffic","address":"[::]:2380"} 2026-02-19T03:10:12.901666875Z {"level":"info","ts":"2026-02-19T03:10:12.901653Z","caller":"embed/etcd.go:606","msg":"cmux::serve","address":"[::]:2380"} 2026-02-19T03:10:12.902437748Z {"level":"info","ts":"2026-02-19T03:10:12.902381Z","caller":"embed/etcd.go:294","msg":"now serving peer/client/metrics","local-member-id":"91eb892c5ee87610","initial-advertise-peer-urls":["https://192.168.32.10:2380"],"listen-peer-urls":["https://0.0.0.0:2380"],"advertise-client-urls":["https://192.168.32.10:2379"],"listen-client-urls":["https://0.0.0.0:2379","unixs://192.168.32.10:0"],"listen-metrics-urls":["https://0.0.0.0:9978"]} 2026-02-19T03:10:12.902469449Z {"level":"info","ts":"2026-02-19T03:10:12.902430Z","caller":"embed/etcd.go:911","msg":"serving metrics","address":"https://0.0.0.0:9978"} 2026-02-19T03:10:15.350601763Z {"level":"info","ts":"2026-02-19T03:10:15.350503Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 is starting a new election at term 3"} 2026-02-19T03:10:15.350601763Z {"level":"info","ts":"2026-02-19T03:10:15.350548Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 became pre-candidate at term 3"} 2026-02-19T03:10:15.350601763Z {"level":"info","ts":"2026-02-19T03:10:15.350563Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 received MsgPreVoteResp from 91eb892c5ee87610 at term 3"} 2026-02-19T03:10:15.350664914Z {"level":"info","ts":"2026-02-19T03:10:15.350575Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 became candidate at term 4"} 2026-02-19T03:10:15.350664914Z {"level":"info","ts":"2026-02-19T03:10:15.350603Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 received MsgVoteResp from 91eb892c5ee87610 at term 4"} 2026-02-19T03:10:15.350664914Z {"level":"info","ts":"2026-02-19T03:10:15.350612Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"91eb892c5ee87610 became leader at term 4"} 2026-02-19T03:10:15.350664914Z {"level":"info","ts":"2026-02-19T03:10:15.350619Z","logger":"raft","caller":"etcdserver/zap_raft.go:77","msg":"raft.node: 91eb892c5ee87610 elected leader 91eb892c5ee87610 at term 4"} 2026-02-19T03:10:15.354884488Z {"level":"info","ts":"2026-02-19T03:10:15.354804Z","caller":"etcdserver/server.go:2150","msg":"published local member to cluster through raft","local-member-id":"91eb892c5ee87610","local-member-attributes":"{Name:master-0 ClientURLs:[https://192.168.32.10:2379]}","request-path":"/0/members/91eb892c5ee87610/attributes","cluster-id":"a3c29fbf00fc418e","publish-timeout":"30s"} 2026-02-19T03:10:15.354884488Z {"level":"info","ts":"2026-02-19T03:10:15.354843Z","caller":"embed/serve.go:124","msg":"ready to serve client requests"} 2026-02-19T03:10:15.355199937Z {"level":"info","ts":"2026-02-19T03:10:15.355079Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-02-19T03:10:15.355199937Z {"level":"info","ts":"2026-02-19T03:10:15.355152Z","caller":"embed/serve.go:124","msg":"ready to serve client requests"} 2026-02-19T03:10:15.355199937Z {"level":"info","ts":"2026-02-19T03:10:15.355169Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-02-19T03:10:15.355897997Z {"level":"info","ts":"2026-02-19T03:10:15.355836Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} 2026-02-19T03:10:15.355897997Z {"level":"info","ts":"2026-02-19T03:10:15.355839Z","caller":"v3rpc/health.go:61","msg":"grpc service status changed","service":"","status":"SERVING"} 2026-02-19T03:10:15.358149833Z {"level":"info","ts":"2026-02-19T03:10:15.358070Z","caller":"embed/serve.go:275","msg":"serving client traffic securely","traffic":"grpc+http","address":"192.168.32.10:0"} 2026-02-19T03:10:15.358839143Z {"level":"info","ts":"2026-02-19T03:10:15.358755Z","caller":"embed/serve.go:275","msg":"serving client traffic securely","traffic":"grpc+http","address":"[::]:2379"} 2026-02-19T03:11:53.253788454Z {"level":"info","ts":"2026-02-19T03:11:53.253589Z","caller":"traceutil/trace.go:171","msg":"trace[144634338] transaction","detail":"{read_only:false; response_revision:9089; number_of_response:1; }","duration":"234.769088ms","start":"2026-02-19T03:11:53.018794Z","end":"2026-02-19T03:11:53.253563Z","steps":["trace[144634338] 'process raft request' (duration: 105.640132ms)","trace[144634338] 'compare' (duration: 128.766185ms)"],"step_count":2} 2026-02-19T03:11:53.253955369Z {"level":"warn","ts":"2026-02-19T03:11:53.253821Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"214.141938ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/catalogsources/\" range_end:\"/kubernetes.io/operators.coreos.com/catalogsources0\" count_only:true ","response":"range_response_count:0 size:7"} 2026-02-19T03:11:53.253955369Z {"level":"info","ts":"2026-02-19T03:11:53.253725Z","caller":"traceutil/trace.go:171","msg":"trace[1318172979] linearizableReadLoop","detail":"{readStateIndex:9548; appliedIndex:9547; }","duration":"213.898161ms","start":"2026-02-19T03:11:53.039637Z","end":"2026-02-19T03:11:53.253535Z","steps":["trace[1318172979] 'read index received' (duration: 84.748625ms)","trace[1318172979] 'applied index is now lower than readState.Index' (duration: 129.148166ms)"],"step_count":2} 2026-02-19T03:11:53.254067432Z {"level":"info","ts":"2026-02-19T03:11:53.253983Z","caller":"traceutil/trace.go:171","msg":"trace[1257238296] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/catalogsources/; range_end:/kubernetes.io/operators.coreos.com/catalogsources0; response_count:0; response_revision:9089; }","duration":"214.295181ms","start":"2026-02-19T03:11:53.039609Z","end":"2026-02-19T03:11:53.253904Z","steps":["trace[1257238296] 'agreement among raft nodes before linearized reading' (duration: 214.117236ms)"],"step_count":1} 2026-02-19T03:11:54.134182436Z {"level":"warn","ts":"2026-02-19T03:11:54.134014Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"207.656329ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusterversions/version\" ","response":"range_response_count:1 size:4449"} 2026-02-19T03:11:54.134182436Z {"level":"info","ts":"2026-02-19T03:11:54.134094Z","caller":"traceutil/trace.go:171","msg":"trace[1557655499] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:9092; }","duration":"207.782192ms","start":"2026-02-19T03:11:53.926294Z","end":"2026-02-19T03:11:54.134076Z","steps":["trace[1557655499] 'range keys from in-memory index tree' (duration: 207.550046ms)"],"step_count":1} 2026-02-19T03:12:30.514849482Z {"level":"info","ts":"2026-02-19T03:12:30.514755Z","caller":"etcdserver/server.go:1482","msg":"triggering snapshot","local-member-id":"91eb892c5ee87610","local-member-applied-index":10001,"local-member-snapshot-index":0,"local-member-snapshot-count":10000} 2026-02-19T03:12:30.522432143Z {"level":"info","ts":"2026-02-19T03:12:30.522373Z","caller":"etcdserver/server.go:2503","msg":"saved snapshot","snapshot-index":10001} 2026-02-19T03:12:30.522522735Z {"level":"info","ts":"2026-02-19T03:12:30.522505Z","caller":"etcdserver/server.go:2533","msg":"compacted Raft logs","compact-index":5001} 2026-02-19T03:12:37.030207792Z {"level":"warn","ts":"2026-02-19T03:12:37.029844Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"392.302119ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/roles/openshift-config-managed/machine-approver\" ","response":"range_response_count:1 size:1065"} 2026-02-19T03:12:37.030207792Z {"level":"info","ts":"2026-02-19T03:12:37.029938Z","caller":"traceutil/trace.go:171","msg":"trace[1848449271] range","detail":"{range_begin:/kubernetes.io/roles/openshift-config-managed/machine-approver; range_end:; response_count:1; response_revision:10175; }","duration":"392.420752ms","start":"2026-02-19T03:12:36.637494Z","end":"2026-02-19T03:12:37.029915Z","steps":["trace[1848449271] 'range keys from in-memory index tree' (duration: 392.210006ms)"],"step_count":1} 2026-02-19T03:12:37.030207792Z {"level":"warn","ts":"2026-02-19T03:12:37.029975Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-19T03:12:36.637474Z","time spent":"392.494094ms","remote":"[::1]:51446","response type":"/etcdserverpb.KV/Range","request count":0,"request size":64,"response count":1,"response size":1089,"request content":"key:\"/kubernetes.io/roles/openshift-config-managed/machine-approver\" "} 2026-02-19T03:12:37.030207792Z {"level":"warn","ts":"2026-02-19T03:12:37.030153Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"378.9443ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-02-19T03:12:37.030207792Z {"level":"info","ts":"2026-02-19T03:12:37.030182Z","caller":"traceutil/trace.go:171","msg":"trace[201092873] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10175; }","duration":"378.989381ms","start":"2026-02-19T03:12:36.651184Z","end":"2026-02-19T03:12:37.030174Z","steps":["trace[201092873] 'range keys from in-memory index tree' (duration: 378.912729ms)"],"step_count":1} 2026-02-19T03:12:37.030278114Z {"level":"warn","ts":"2026-02-19T03:12:37.030208Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-19T03:12:36.651176Z","time spent":"379.025333ms","remote":"[::1]:50460","response type":"/etcdserverpb.KV/Range","request count":0,"request size":50,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 "} 2026-02-19T03:12:37.030421428Z {"level":"warn","ts":"2026-02-19T03:12:37.030336Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"342.755768ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/services/specs/openshift-cluster-olm-operator/cluster-olm-operator-metrics\" ","response":"range_response_count:1 size:1709"} 2026-02-19T03:12:37.030466889Z {"level":"info","ts":"2026-02-19T03:12:37.030432Z","caller":"traceutil/trace.go:171","msg":"trace[409260692] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-cluster-olm-operator/cluster-olm-operator-metrics; range_end:; response_count:1; response_revision:10175; }","duration":"342.879661ms","start":"2026-02-19T03:12:36.687529Z","end":"2026-02-19T03:12:37.030409Z","steps":["trace[409260692] 'range keys from in-memory index tree' (duration: 342.651374ms)"],"step_count":1} 2026-02-19T03:12:37.030481190Z {"level":"warn","ts":"2026-02-19T03:12:37.030442Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"318.666817ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterroles/system:openshift:operator:cloud-controller-manager\" ","response":"range_response_count:1 size:1850"} 2026-02-19T03:12:37.030510251Z {"level":"warn","ts":"2026-02-19T03:12:37.030481Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-19T03:12:36.687516Z","time spent":"342.954614ms","remote":"[::1]:48084","response type":"/etcdserverpb.KV/Range","request count":0,"request size":91,"response count":1,"response size":1733,"request content":"key:\"/kubernetes.io/services/specs/openshift-cluster-olm-operator/cluster-olm-operator-metrics\" "} 2026-02-19T03:12:37.030510251Z {"level":"info","ts":"2026-02-19T03:12:37.030491Z","caller":"traceutil/trace.go:171","msg":"trace[899728168] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:operator:cloud-controller-manager; range_end:; response_count:1; response_revision:10175; }","duration":"318.74519ms","start":"2026-02-19T03:12:36.711732Z","end":"2026-02-19T03:12:37.030477Z","steps":["trace[899728168] 'range keys from in-memory index tree' (duration: 318.556894ms)"],"step_count":1} 2026-02-19T03:12:37.030558552Z {"level":"warn","ts":"2026-02-19T03:12:37.030524Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-19T03:12:36.711711Z","time spent":"318.805261ms","remote":"[::1]:51626","response type":"/etcdserverpb.KV/Range","request count":0,"request size":80,"response count":1,"response size":1874,"request content":"key:\"/kubernetes.io/clusterroles/system:openshift:operator:cloud-controller-manager\" "} 2026-02-19T03:12:37.030822540Z {"level":"warn","ts":"2026-02-19T03:12:37.030763Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"368.487036ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-machine-api-vsphere\" ","response":"range_response_count:1 size:1538"} 2026-02-19T03:12:37.030822540Z {"level":"info","ts":"2026-02-19T03:12:37.030799Z","caller":"traceutil/trace.go:171","msg":"trace[1698965751] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-machine-api-vsphere; range_end:; response_count:1; response_revision:10175; }","duration":"368.546208ms","start":"2026-02-19T03:12:36.662242Z","end":"2026-02-19T03:12:37.030788Z","steps":["trace[1698965751] 'range keys from in-memory index tree' (duration: 368.441654ms)"],"step_count":1} 2026-02-19T03:12:37.030843770Z {"level":"warn","ts":"2026-02-19T03:12:37.030822Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-19T03:12:36.662235Z","time spent":"368.581049ms","remote":"[::1]:40650","response type":"/etcdserverpb.KV/Range","request count":0,"request size":132,"response count":1,"response size":1562,"request content":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-machine-api-vsphere\" "} 2026-02-19T03:12:37.031199291Z {"level":"warn","ts":"2026-02-19T03:12:37.031147Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"359.916977ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 ","response":"range_response_count:0 size:5"} 2026-02-19T03:12:37.031199291Z {"level":"warn","ts":"2026-02-19T03:12:37.031155Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"358.802344ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/events/openshift-cluster-olm-operator/\" range_end:\"/kubernetes.io/events/openshift-cluster-olm-operator0\" ","response":"range_response_count:79 size:93405"} 2026-02-19T03:12:37.031199291Z {"level":"info","ts":"2026-02-19T03:12:37.031182Z","caller":"traceutil/trace.go:171","msg":"trace[413898990] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10175; }","duration":"359.961808ms","start":"2026-02-19T03:12:36.671209Z","end":"2026-02-19T03:12:37.031171Z","steps":["trace[413898990] 'range keys from in-memory index tree' (duration: 359.832224ms)"],"step_count":1} 2026-02-19T03:12:37.031229012Z {"level":"info","ts":"2026-02-19T03:12:37.031188Z","caller":"traceutil/trace.go:171","msg":"trace[2013089008] range","detail":"{range_begin:/kubernetes.io/events/openshift-cluster-olm-operator/; range_end:/kubernetes.io/events/openshift-cluster-olm-operator0; response_count:79; response_revision:10175; }","duration":"358.863756ms","start":"2026-02-19T03:12:36.672314Z","end":"2026-02-19T03:12:37.031178Z","steps":["trace[2013089008] 'range keys from in-memory index tree' (duration: 358.464805ms)"],"step_count":1} 2026-02-19T03:12:37.031229012Z {"level":"warn","ts":"2026-02-19T03:12:37.031203Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-19T03:12:36.671201Z","time spent":"359.996509ms","remote":"[::1]:51630","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 "} 2026-02-19T03:12:37.031243172Z {"level":"warn","ts":"2026-02-19T03:12:37.031222Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-19T03:12:36.672294Z","time spent":"358.916627ms","remote":"[::1]:33784","response type":"/etcdserverpb.KV/Range","request count":0,"request size":110,"response count":79,"response size":93429,"request content":"key:\"/kubernetes.io/events/openshift-cluster-olm-operator/\" range_end:\"/kubernetes.io/events/openshift-cluster-olm-operator0\" "} 2026-02-19T03:12:37.043624532Z {"level":"info","ts":"2026-02-19T03:12:37.043487Z","caller":"traceutil/trace.go:171","msg":"trace[1728668377] linearizableReadLoop","detail":"{readStateIndex:10690; appliedIndex:10689; }","duration":"319.383658ms","start":"2026-02-19T03:12:36.724081Z","end":"2026-02-19T03:12:37.043465Z","steps":["trace[1728668377] 'read index received' (duration: 319.335147ms)","trace[1728668377] 'applied index is now lower than readState.Index' (duration: 47.551µs)"],"step_count":2} 2026-02-19T03:12:37.043624532Z {"level":"info","ts":"2026-02-19T03:12:37.043545Z","caller":"traceutil/trace.go:171","msg":"trace[810273296] transaction","detail":"{read_only:false; response_revision:10176; number_of_response:1; }","duration":"328.794682ms","start":"2026-02-19T03:12:36.714720Z","end":"2026-02-19T03:12:37.043515Z","steps":["trace[810273296] 'process raft request' (duration: 328.629927ms)"],"step_count":1} 2026-02-19T03:12:37.043712045Z {"level":"warn","ts":"2026-02-19T03:12:37.043660Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"319.560513ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods/openshift-marketplace/redhat-operators-v9c2b\" ","response":"range_response_count:1 size:9519"} 2026-02-19T03:12:37.043727285Z {"level":"info","ts":"2026-02-19T03:12:37.043705Z","caller":"traceutil/trace.go:171","msg":"trace[788160828] range","detail":"{range_begin:/kubernetes.io/pods/openshift-marketplace/redhat-operators-v9c2b; range_end:; response_count:1; response_revision:10176; }","duration":"319.638295ms","start":"2026-02-19T03:12:36.724053Z","end":"2026-02-19T03:12:37.043692Z","steps":["trace[788160828] 'agreement among raft nodes before linearized reading' (duration: 319.532342ms)"],"step_count":1} 2026-02-19T03:12:37.043887190Z {"level":"warn","ts":"2026-02-19T03:12:37.043742Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-19T03:12:36.724036Z","time spent":"319.696237ms","remote":"[::1]:50306","response type":"/etcdserverpb.KV/Range","request count":0,"request size":66,"response count":1,"response size":9543,"request content":"key:\"/kubernetes.io/pods/openshift-marketplace/redhat-operators-v9c2b\" "} 2026-02-19T03:12:37.044799646Z {"level":"warn","ts":"2026-02-19T03:12:37.044680Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"307.40419ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-kube-scheduler/prometheus-k8s\" ","response":"range_response_count:1 size:956"} 2026-02-19T03:12:37.044799646Z {"level":"info","ts":"2026-02-19T03:12:37.044755Z","caller":"traceutil/trace.go:171","msg":"trace[1304141363] range","detail":"{range_begin:/kubernetes.io/k8s.ovn.org/userdefinednetworks/; range_end:/kubernetes.io/k8s.ovn.org/userdefinednetworks0; response_count:0; response_revision:10177; }","duration":"144.943555ms","start":"2026-02-19T03:12:36.899789Z","end":"2026-02-19T03:12:37.044733Z","steps":["trace[1304141363] 'agreement among raft nodes before linearized reading' (duration: 144.916865ms)"],"step_count":1} 2026-02-19T03:12:37.044845638Z {"level":"warn","ts":"2026-02-19T03:12:37.044779Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"206.66388ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/podmonitors.monitoring.coreos.com\" ","response":"range_response_count:1 size:36012"} 2026-02-19T03:12:37.044926670Z {"level":"warn","ts":"2026-02-19T03:12:37.044857Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"256.127599ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-network-operator/cluster-network-operator\" ","response":"range_response_count:1 size:1397"} 2026-02-19T03:12:37.044926670Z {"level":"info","ts":"2026-02-19T03:12:37.044865Z","caller":"traceutil/trace.go:171","msg":"trace[666561311] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-authentication/oauth-openshift; range_end:; response_count:1; response_revision:10177; }","duration":"157.024557ms","start":"2026-02-19T03:12:36.887828Z","end":"2026-02-19T03:12:37.044852Z","steps":["trace[666561311] 'agreement among raft nodes before linearized reading' (duration: 156.989526ms)"],"step_count":1} 2026-02-19T03:12:37.044926670Z {"level":"info","ts":"2026-02-19T03:12:37.044880Z","caller":"traceutil/trace.go:171","msg":"trace[840556942] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/podmonitors.monitoring.coreos.com; range_end:; response_count:1; response_revision:10177; }","duration":"206.789494ms","start":"2026-02-19T03:12:36.838056Z","end":"2026-02-19T03:12:37.044845Z","steps":["trace[840556942] 'agreement among raft nodes before linearized reading' (duration: 206.593458ms)"],"step_count":1} 2026-02-19T03:12:37.044926670Z {"level":"info","ts":"2026-02-19T03:12:37.044897Z","caller":"traceutil/trace.go:171","msg":"trace[1795288223] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-network-operator/cluster-network-operator; range_end:; response_count:1; response_revision:10177; }","duration":"256.19041ms","start":"2026-02-19T03:12:36.788696Z","end":"2026-02-19T03:12:37.044887Z","steps":["trace[1795288223] 'agreement among raft nodes before linearized reading' (duration: 256.137198ms)"],"step_count":1} 2026-02-19T03:12:37.045059034Z {"level":"info","ts":"2026-02-19T03:12:37.044993Z","caller":"traceutil/trace.go:171","msg":"trace[1935851451] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-machine-config-operator/machine-config-operator; range_end:; response_count:1; response_revision:10177; }","duration":"108.352861ms","start":"2026-02-19T03:12:36.936626Z","end":"2026-02-19T03:12:37.044978Z","steps":["trace[1935851451] 'agreement among raft nodes before linearized reading' (duration: 108.320741ms)"],"step_count":1} 2026-02-19T03:12:37.045281570Z {"level":"warn","ts":"2026-02-19T03:12:37.045131Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"283.159865ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/system:openshift:operator:cluster-kube-scheduler-operator\" ","response":"range_response_count:1 size:1251"} 2026-02-19T03:12:37.045281570Z {"level":"info","ts":"2026-02-19T03:12:37.045155Z","caller":"traceutil/trace.go:171","msg":"trace[544222293] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:cluster-kube-scheduler-operator; range_end:; response_count:1; response_revision:10177; }","duration":"283.225396ms","start":"2026-02-19T03:12:36.761920Z","end":"2026-02-19T03:12:37.045146Z","steps":["trace[544222293] 'agreement among raft nodes before linearized reading' (duration: 283.184125ms)"],"step_count":1} 2026-02-19T03:12:37.045281570Z {"level":"info","ts":"2026-02-19T03:12:37.045155Z","caller":"traceutil/trace.go:171","msg":"trace[1734593114] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-cluster-version/cluster-version-operator; range_end:; response_count:1; response_revision:10177; }","duration":"182.420215ms","start":"2026-02-19T03:12:36.862725Z","end":"2026-02-19T03:12:37.045145Z","steps":["trace[1734593114] 'agreement among raft nodes before linearized reading' (duration: 182.392625ms)"],"step_count":1} 2026-02-19T03:12:37.045281570Z {"level":"info","ts":"2026-02-19T03:12:37.045179Z","caller":"traceutil/trace.go:171","msg":"trace[1347030734] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-operators; range_end:; response_count:1; response_revision:10177; }","duration":"133.388999ms","start":"2026-02-19T03:12:36.911780Z","end":"2026-02-19T03:12:37.045169Z","steps":["trace[1347030734] 'agreement among raft nodes before linearized reading' (duration: 133.357568ms)"],"step_count":1} 2026-02-19T03:12:37.045321991Z {"level":"warn","ts":"2026-02-19T03:12:37.044821Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"232.10288ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/system:openshift:operator:kube-controller-manager-operator\" ","response":"range_response_count:1 size:1261"} 2026-02-19T03:12:37.045338272Z {"level":"info","ts":"2026-02-19T03:12:37.044766Z","caller":"traceutil/trace.go:171","msg":"trace[735151665] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-kube-scheduler/prometheus-k8s; range_end:; response_count:1; response_revision:10177; }","duration":"307.536464ms","start":"2026-02-19T03:12:36.737210Z","end":"2026-02-19T03:12:37.044747Z","steps":["trace[735151665] 'agreement among raft nodes before linearized reading' (duration: 307.39348ms)"],"step_count":1} 2026-02-19T03:12:37.045351472Z {"level":"info","ts":"2026-02-19T03:12:37.045330Z","caller":"traceutil/trace.go:171","msg":"trace[683147619] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:kube-controller-manager-operator; range_end:; response_count:1; response_revision:10177; }","duration":"232.633405ms","start":"2026-02-19T03:12:36.812685Z","end":"2026-02-19T03:12:37.045319Z","steps":["trace[683147619] 'agreement among raft nodes before linearized reading' (duration: 232.10357ms)"],"step_count":1} 2026-02-19T03:12:37.048004749Z {"level":"warn","ts":"2026-02-19T03:12:37.045355Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-19T03:12:36.737183Z","time spent":"308.159261ms","remote":"[::1]:48134","response type":"/etcdserverpb.KV/Range","request count":0,"request size":69,"response count":1,"response size":980,"request content":"key:\"/kubernetes.io/rolebindings/openshift-kube-scheduler/prometheus-k8s\" "} 2026-02-19T03:12:37.048004749Z {"level":"warn","ts":"2026-02-19T03:12:37.045518Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-02-19T03:12:36.714705Z","time spent":"328.926485ms","remote":"[::1]:40554","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":496,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-02-19T03:12:37.048004749Z {"level":"warn","ts":"2026-02-19T03:12:37.045823Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"297.335857ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-operators\" ","response":"range_response_count:1 size:1010"} 2026-02-19T03:12:37.048004749Z {"level":"info","ts":"2026-02-19T03:12:37.045848Z","caller":"traceutil/trace.go:171","msg":"trace[238306434] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-marketplace/redhat-operators; range_end:; response_count:1; response_revision:10177; }","duration":"297.387189ms","start":"2026-02-19T03:12:36.748453Z","end":"2026-02-19T03:12:37.045840Z","steps":["trace[238306434] 'agreement among raft nodes before linearized reading' (duration: 297.334907ms)"],"step_count":1} 2026-02-19T03:12:37.048004749Z {"level":"warn","ts":"2026-02-19T03:12:37.046031Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"297.490372ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/events/\" range_end:\"/kubernetes.io/events0\" count_only:true ","response":"range_response_count:0 size:8"} 2026-02-19T03:12:37.048004749Z {"level":"info","ts":"2026-02-19T03:12:37.046061Z","caller":"traceutil/trace.go:171","msg":"trace[1183617380] range","detail":"{range_begin:/kubernetes.io/events/; range_end:/kubernetes.io/events0; response_count:0; response_revision:10177; }","duration":"297.530473ms","start":"2026-02-19T03:12:36.748524Z","end":"2026-02-19T03:12:37.046054Z","steps":["trace[1183617380] 'agreement among raft nodes before linearized reading' (duration: 296.761ms)"],"step_count":1} 2026-02-19T03:12:41.873542048Z {"level":"warn","ts":"2026-02-19T03:12:41.873402Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"201.5517ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods/openshift-etcd/etcd-master-0\" ","response":"range_response_count:1 size:41407"} 2026-02-19T03:12:41.873542048Z {"level":"info","ts":"2026-02-19T03:12:41.873471Z","caller":"traceutil/trace.go:171","msg":"trace[389942740] range","detail":"{range_begin:/kubernetes.io/pods/openshift-etcd/etcd-master-0; range_end:; response_count:1; response_revision:10331; }","duration":"201.655004ms","start":"2026-02-19T03:12:41.671802Z","end":"2026-02-19T03:12:41.873457Z","steps":["trace[389942740] 'range keys from in-memory index tree' (duration: 201.420197ms)"],"step_count":1} 2026-02-19T03:12:41.873542048Z {"level":"info","ts":"2026-02-19T03:12:41.873460Z","caller":"traceutil/trace.go:171","msg":"trace[2052613622] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:10331; }","duration":"171.606349ms","start":"2026-02-19T03:12:41.701815Z","end":"2026-02-19T03:12:41.873422Z","steps":["trace[2052613622] 'range keys from in-memory index tree' (duration: 171.472926ms)"],"step_count":1} 2026-02-19T03:12:41.873652991Z {"level":"info","ts":"2026-02-19T03:12:41.873575Z","caller":"traceutil/trace.go:171","msg":"trace[1414726999] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-cluster-machine-approver/machine-approver; range_end:; response_count:1; response_revision:10331; }","duration":"161.528436ms","start":"2026-02-19T03:12:41.712026Z","end":"2026-02-19T03:12:41.873554Z","steps":["trace[1414726999] 'range keys from in-memory index tree' (duration: 161.375822ms)"],"step_count":1} 2026-02-19T03:12:41.874022042Z {"level":"info","ts":"2026-02-19T03:12:41.873796Z","caller":"traceutil/trace.go:171","msg":"trace[782230364] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:cloud-controller-manager; range_end:; response_count:1; response_revision:10331; }","duration":"183.151525ms","start":"2026-02-19T03:12:41.690633Z","end":"2026-02-19T03:12:41.873785Z","steps":["trace[782230364] 'range keys from in-memory index tree' (duration: 183.024512ms)"],"step_count":1} 2026-02-19T03:12:41.874022042Z {"level":"info","ts":"2026-02-19T03:12:41.873828Z","caller":"traceutil/trace.go:171","msg":"trace[1035172288] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-machine-api/mao-trusted-ca; range_end:; response_count:1; response_revision:10331; }","duration":"136.656014ms","start":"2026-02-19T03:12:41.737160Z","end":"2026-02-19T03:12:41.873816Z","steps":["trace[1035172288] 'range keys from in-memory index tree' (duration: 136.448168ms)"],"step_count":1} 2026-02-19T03:12:41.874022042Z {"level":"info","ts":"2026-02-19T03:12:41.873893Z","caller":"traceutil/trace.go:171","msg":"trace[947114833] linearizableReadLoop","detail":"{readStateIndex:10853; appliedIndex:10852; }","duration":"111.444931ms","start":"2026-02-19T03:12:41.762436Z","end":"2026-02-19T03:12:41.873881Z","steps":["trace[947114833] 'read index received' (duration: 79.855072ms)","trace[947114833] 'applied index is now lower than readState.Index' (duration: 31.589069ms)"],"step_count":2} 2026-02-19T03:12:41.874022042Z {"level":"info","ts":"2026-02-19T03:12:41.873953Z","caller":"traceutil/trace.go:171","msg":"trace[1837896284] transaction","detail":"{read_only:false; number_of_response:0; response_revision:10331; }","duration":"124.396768ms","start":"2026-02-19T03:12:41.749511Z","end":"2026-02-19T03:12:41.873907Z","steps":["trace[1837896284] 'process raft request' (duration: 92.762328ms)","trace[1837896284] 'compare' (duration: 31.557947ms)"],"step_count":2} 2026-02-19T03:12:41.874075394Z {"level":"info","ts":"2026-02-19T03:12:41.874015Z","caller":"traceutil/trace.go:171","msg":"trace[128642596] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/infrastructures.config.openshift.io; range_end:; response_count:1; response_revision:10331; }","duration":"111.604895ms","start":"2026-02-19T03:12:41.762395Z","end":"2026-02-19T03:12:41.874000Z","steps":["trace[128642596] 'agreement among raft nodes before linearized reading' (duration: 111.548174ms)"],"step_count":1} 2026-02-19T03:12:41.955471931Z {"level":"info","ts":"2026-02-19T03:12:41.953819Z","caller":"traceutil/trace.go:171","msg":"trace[1547203641] transaction","detail":"{read_only:false; response_revision:10332; number_of_response:1; }","duration":"188.44119ms","start":"2026-02-19T03:12:41.765362Z","end":"2026-02-19T03:12:41.953803Z","steps":["trace[1547203641] 'process raft request' (duration: 188.151622ms)"],"step_count":1} 2026-02-19T03:12:41.955471931Z {"level":"info","ts":"2026-02-19T03:12:41.953921Z","caller":"traceutil/trace.go:171","msg":"trace[531792630] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/machineconfigs/00-master; range_end:; response_count:1; response_revision:10332; }","duration":"124.988455ms","start":"2026-02-19T03:12:41.828925Z","end":"2026-02-19T03:12:41.953913Z","steps":["trace[531792630] 'agreement among raft nodes before linearized reading' (duration: 124.929944ms)"],"step_count":1} 2026-02-19T03:12:41.955471931Z {"level":"info","ts":"2026-02-19T03:12:41.953976Z","caller":"traceutil/trace.go:171","msg":"trace[1462575510] range","detail":"{range_begin:/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots/; range_end:/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots0; response_count:0; response_revision:10332; }","duration":"163.947418ms","start":"2026-02-19T03:12:41.789999Z","end":"2026-02-19T03:12:41.953946Z","steps":["trace[1462575510] 'agreement among raft nodes before linearized reading' (duration: 163.881286ms)"],"step_count":1} 2026-02-19T03:12:41.955471931Z {"level":"info","ts":"2026-02-19T03:12:41.953817Z","caller":"traceutil/trace.go:171","msg":"trace[1929918740] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-monitoring; range_end:; response_count:1; response_revision:10332; }","duration":"116.327773ms","start":"2026-02-19T03:12:41.837471Z","end":"2026-02-19T03:12:41.953798Z","steps":["trace[1929918740] 'agreement among raft nodes before linearized reading' (duration: 116.262181ms)"],"step_count":1} 2026-02-19T03:12:41.955471931Z {"level":"info","ts":"2026-02-19T03:12:41.954080Z","caller":"traceutil/trace.go:171","msg":"trace[930130210] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/dashboard-pod-total; range_end:; response_count:1; response_revision:10332; }","duration":"142.221226ms","start":"2026-02-19T03:12:41.811850Z","end":"2026-02-19T03:12:41.954071Z","steps":["trace[930130210] 'agreement among raft nodes before linearized reading' (duration: 142.195295ms)"],"step_count":1} 2026-02-19T03:12:41.955471931Z {"level":"info","ts":"2026-02-19T03:12:41.953825Z","caller":"traceutil/trace.go:171","msg":"trace[1169711283] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/machineconfigs/98-worker-generated-kubelet; range_end:; response_count:1; response_revision:10332; }","duration":"157.243563ms","start":"2026-02-19T03:12:41.796559Z","end":"2026-02-19T03:12:41.953802Z","steps":["trace[1169711283] 'agreement among raft nodes before linearized reading' (duration: 157.186981ms)"],"step_count":1} 2026-02-19T03:12:41.955471931Z {"level":"info","ts":"2026-02-19T03:12:41.954278Z","caller":"traceutil/trace.go:171","msg":"trace[717943511] range","detail":"{range_begin:/kubernetes.io/pods/openshift-machine-config-operator/machine-config-server-m64bf; range_end:; response_count:1; response_revision:10332; }","duration":"169.887981ms","start":"2026-02-19T03:12:41.784345Z","end":"2026-02-19T03:12:41.954233Z","steps":["trace[717943511] 'agreement among raft nodes before linearized reading' (duration: 169.811078ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715145477665023146 0ustar00000000000000002026-02-19T03:06:10.190301280Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-85f97c6ffb-qfcnk/oauth-apiserver_current.log0000640000000000000000000011450315145477665031550 0ustar00000000000000002026-02-19T03:10:40.202091955Z E0219 03:10:40.202009 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:40.202360423Z E0219 03:10:40.202323 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:40.226703265Z E0219 03:10:40.226632 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:40.226703265Z E0219 03:10:40.226661 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:40.226794328Z E0219 03:10:40.226753 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:40.226855470Z E0219 03:10:40.226660 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:40.227159108Z E0219 03:10:40.227104 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:46.187143315Z E0219 03:10:46.187040 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:46.187221157Z E0219 03:10:46.187137 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:46.187221157Z E0219 03:10:46.187137 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:46.187312460Z E0219 03:10:46.187057 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:46.187384102Z E0219 03:10:46.187061 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:46.362393320Z E0219 03:10:46.359792 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:46.362393320Z E0219 03:10:46.359946 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:46.362393320Z E0219 03:10:46.360308 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:46.362393320Z E0219 03:10:46.360647 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:10:46.362393320Z E0219 03:10:46.359792 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.194307513Z E0219 03:11:10.194204 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.194307513Z E0219 03:11:10.194233 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.194390456Z E0219 03:11:10.194357 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.194390456Z E0219 03:11:10.194370 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.194468098Z E0219 03:11:10.194233 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.213587887Z E0219 03:11:10.213531 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.213904636Z E0219 03:11:10.213867 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.214153644Z E0219 03:11:10.214122 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.214153644Z E0219 03:11:10.214126 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.214153644Z E0219 03:11:10.214135 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.324578323Z E0219 03:11:10.324510 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.331756613Z E0219 03:11:10.331690 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.337778629Z E0219 03:11:10.337705 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:10.343372793Z E0219 03:11:10.343299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:16.196014780Z E0219 03:11:16.195926 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:16.196014780Z E0219 03:11:16.195942 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:16.196085622Z E0219 03:11:16.196055 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:16.196137054Z E0219 03:11:16.196103 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:16.196318649Z E0219 03:11:16.196247 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:16.370122182Z E0219 03:11:16.370050 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:16.370122182Z E0219 03:11:16.370052 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:16.370203574Z E0219 03:11:16.370153 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:16.370394130Z E0219 03:11:16.370233 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:16.370455792Z E0219 03:11:16.370411 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:40.197210184Z E0219 03:11:40.197139 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:40.197552814Z E0219 03:11:40.197492 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:40.197570695Z E0219 03:11:40.197554 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:40.197627746Z E0219 03:11:40.197607 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:40.197837613Z E0219 03:11:40.197804 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:40.197967696Z E0219 03:11:40.197945 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:40.198042709Z E0219 03:11:40.197945 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:40.198042709Z E0219 03:11:40.198034 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:40.198134311Z E0219 03:11:40.198109 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:40.198301166Z E0219 03:11:40.198278 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:46.206618740Z E0219 03:11:46.206249 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:46.206618740Z E0219 03:11:46.206304 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:46.206618740Z E0219 03:11:46.206394 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:46.206618740Z E0219 03:11:46.206439 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:46.207030442Z E0219 03:11:46.206285 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:46.381301860Z E0219 03:11:46.380399 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:46.381301860Z E0219 03:11:46.380443 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:46.381301860Z E0219 03:11:46.380443 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:46.381301860Z E0219 03:11:46.380716 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:11:46.381301860Z E0219 03:11:46.380803 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.199478512Z E0219 03:12:10.198058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.199478512Z E0219 03:12:10.198178 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.199478512Z E0219 03:12:10.198246 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.199478512Z E0219 03:12:10.198476 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.199478512Z E0219 03:12:10.198802 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.223237793Z E0219 03:12:10.223170 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.223424058Z E0219 03:12:10.223337 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.223680995Z E0219 03:12:10.223579 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.223752208Z E0219 03:12:10.223721 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.223788479Z E0219 03:12:10.223765 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.313212389Z E0219 03:12:10.313118 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.321530181Z E0219 03:12:10.321454 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.341334047Z E0219 03:12:10.341187 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:10.349147004Z E0219 03:12:10.349032 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:16.211310059Z E0219 03:12:16.211126 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:16.211310059Z E0219 03:12:16.211202 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:16.211415352Z E0219 03:12:16.211325 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:16.211476714Z E0219 03:12:16.211428 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:16.211737561Z E0219 03:12:16.211202 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:16.391462288Z E0219 03:12:16.391338 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:16.391462288Z E0219 03:12:16.391431 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:16.391803528Z E0219 03:12:16.391687 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:16.391873370Z E0219 03:12:16.391833 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:16.400110949Z E0219 03:12:16.400042 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:31.946498255Z I0219 03:12:31.946411 1 policy_source.go:224] refreshing policies 2026-02-19T03:12:34.959156854Z I0219 03:12:34.958577 1 policy_source.go:224] refreshing policies 2026-02-19T03:12:35.959051842Z I0219 03:12:35.958980 1 policy_source.go:224] refreshing policies 2026-02-19T03:12:35.968382883Z I0219 03:12:35.968336 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-02-19T03:12:35.970458604Z I0219 03:12:35.970421 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-19T03:12:40.201548696Z E0219 03:12:40.200580 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.201548696Z E0219 03:12:40.200714 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.201548696Z E0219 03:12:40.200925 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.202403621Z E0219 03:12:40.202378 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.202547565Z E0219 03:12:40.202517 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.202706520Z E0219 03:12:40.202653 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.206279034Z E0219 03:12:40.202774 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.206279034Z E0219 03:12:40.202873 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.206279034Z E0219 03:12:40.203001 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" 2026-02-19T03:12:40.206279034Z E0219 03:12:40.203060 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2229399815718716887, SKID=E9:EB:64:51:A3:24:6E:FE:C0:63:F5:7B:11:B8:BE:A4:47:5F:AD:C9, AKID=5C:40:62:FD:F9:8E:FA:03:51:B9:E3:69:0B:BF:32:9E:4F:DE:BB:0D failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/router-default-7b65dc9fcb-t6jnq.json0000640000000000000000000001534215145477665023420 0ustar0000000000000000{"metadata":{"name":"router-default-7b65dc9fcb-t6jnq","generateName":"router-default-7b65dc9fcb-","namespace":"openshift-ingress","uid":"76470062-ab83-47ed-a669-deeb71996548","resourceVersion":"6018","creationTimestamp":"2026-02-19T03:05:26Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"6b694f4697","pod-template-hash":"7b65dc9fcb"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-7b65dc9fcb","uid":"6694ca37-6fe1-4363-8ec2-89203321b34d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-bj9hn","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-bj9hn","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000640000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c25,c20"},"supplementalGroups":[1000640000],"fsGroup":1000640000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["6b694f4697"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:26Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000002600115145477665037405 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5bd7c86784-cjz9l2026-02-19T03:10:47.868828634Z Copying system trust bundle 2026-02-19T03:10:47.928595932Z W0219 03:10:47.928455 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-19T03:10:47.928865550Z I0219 03:10:47.928812 1 observer_polling.go:159] Starting file observer 2026-02-19T03:10:47.929043535Z I0219 03:10:47.929003 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-19T03:10:47.929055795Z I0219 03:10:47.929039 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-19T03:10:47.929396765Z I0219 03:10:47.929343 1 observer_polling.go:159] Starting file observer 2026-02-19T03:10:47.944846987Z I0219 03:10:47.944711 1 builder.go:304] cluster-authentication-operator version - 2026-02-19T03:10:47.945977730Z I0219 03:10:47.945855 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:11:15.607946233Z I0219 03:11:15.607815 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-19T03:11:15.623831318Z I0219 03:11:15.622713 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-19T03:11:15.623831318Z I0219 03:11:15.622753 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-19T03:11:15.623831318Z I0219 03:11:15.622789 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-19T03:11:15.623831318Z I0219 03:11:15.622797 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-19T03:11:15.628540256Z I0219 03:11:15.628471 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-19T03:11:15.628540256Z I0219 03:11:15.628422 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-19T03:11:15.628540256Z W0219 03:11:15.628511 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:15.628540256Z W0219 03:11:15.628517 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-19T03:11:15.628540256Z W0219 03:11:15.628521 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-19T03:11:15.628540256Z W0219 03:11:15.628524 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-19T03:11:15.628540256Z W0219 03:11:15.628527 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-19T03:11:15.628540256Z W0219 03:11:15.628530 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-19T03:11:15.642587907Z I0219 03:11:15.642478 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-19T03:11:15.643006299Z I0219 03:11:15.642932 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-19T03:11:15.643006299Z I0219 03:11:15.642952 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-19T03:11:15.643006299Z I0219 03:11:15.642990 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-19T03:11:15.643057340Z I0219 03:11:15.643029 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:15.643057340Z I0219 03:11:15.643032 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-19T03:11:15.643125342Z I0219 03:11:15.643078 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-02-19T03:11:15.643220115Z I0219 03:11:15.643032 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:15.644545004Z I0219 03:11:15.643399 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-19T03:11:15.644545004Z I0219 03:11:15.643418 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-19T03:11:15.644545004Z I0219 03:11:15.643479 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-19T03:11:15.644545004Z I0219 03:11:15.643612 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771470301\" (2026-02-19 03:05:03 +0000 UTC to 2028-02-19 03:05:04 +0000 UTC (now=2026-02-19 03:11:15.643545144 +0000 UTC))" 2026-02-19T03:11:15.644545004Z I0219 03:11:15.643960 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470648\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470648\" (2026-02-19 02:10:47 +0000 UTC to 2027-02-19 02:10:47 +0000 UTC (now=2026-02-19 03:11:15.643895345 +0000 UTC))" 2026-02-19T03:11:15.644545004Z I0219 03:11:15.643995 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-19T03:11:15.644545004Z I0219 03:11:15.644033 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-19T03:11:15.644545004Z I0219 03:11:15.644064 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-19T03:11:15.647649405Z I0219 03:11:15.647582 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-19T03:11:15.647854331Z I0219 03:11:15.647807 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-19T03:11:15.648232532Z I0219 03:11:15.648194 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-02-19T03:11:15.743535759Z I0219 03:11:15.743447 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-19T03:11:15.743568920Z I0219 03:11:15.743508 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-19T03:11:15.743710214Z I0219 03:11:15.743662 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-19T03:11:15.744062044Z I0219 03:11:15.744024 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:48:35 +0000 UTC to 2036-02-17 02:48:35 +0000 UTC (now=2026-02-19 03:11:15.743990752 +0000 UTC))" 2026-02-19T03:11:15.744083995Z I0219 03:11:15.744064 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2026-02-20 02:55:16 +0000 UTC (now=2026-02-19 03:11:15.744047904 +0000 UTC))" 2026-02-19T03:11:15.744094985Z I0219 03:11:15.744086 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:11:15.744074814 +0000 UTC))" 2026-02-19T03:11:15.744122806Z I0219 03:11:15.744104 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-19 02:55:16 +0000 UTC to 2027-02-19 02:55:16 +0000 UTC (now=2026-02-19 03:11:15.744093275 +0000 UTC))" 2026-02-19T03:11:15.744134026Z I0219 03:11:15.744126 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2036-02-17 02:55:14 +0000 UTC (now=2026-02-19 03:11:15.744115046 +0000 UTC))" 2026-02-19T03:11:15.744197258Z I0219 03:11:15.744168 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-19 02:55:14 +0000 UTC to 2026-02-20 02:55:14 +0000 UTC (now=2026-02-19 03:11:15.744156387 +0000 UTC))" 2026-02-19T03:11:15.744414884Z I0219 03:11:15.744378 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771470301\" (2026-02-19 03:05:03 +0000 UTC to 2028-02-19 03:05:04 +0000 UTC (now=2026-02-19 03:11:15.744358873 +0000 UTC))" 2026-02-19T03:11:15.744548208Z I0219 03:11:15.744518 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771470648\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771470648\" (2026-02-19 02:10:47 +0000 UTC to 2027-02-19 02:10:47 +0000 UTC (now=2026-02-19 03:11:15.744501427 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000020027515145477665037606 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5bd7c86784-cjz9l2026-02-19T03:07:42.987089235Z E0219 03:07:42.987067 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-02-19T03:07:46.904327665Z E0219 03:07:46.904218 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-19T03:07:47.662867888Z E0219 03:07:47.662747 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-authentication-operator-lock) 2026-02-19T03:07:49.570679379Z E0219 03:07:49.570585 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps oauth-serving-cert)" 2026-02-19T03:07:49.599933606Z E0219 03:07:49.599833 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:07:57.239296100Z W0219 03:07:57.239184 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal 2026-02-19T03:07:57.239296100Z W0219 03:07:57.239226 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal 2026-02-19T03:07:59.713427475Z W0219 03:07:59.713323 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:07:59.713427475Z E0219 03:07:59.713382 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-02-19T03:08:02.512897020Z E0219 03:08:02.512774 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get endpoints oauth-openshift)" 2026-02-19T03:08:13.716676599Z E0219 03:08:13.716604 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{authentication-operator.189586e385a791f9 openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\",Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-02-19 03:05:40.198207993 +0000 UTC m=+26.970427519,LastTimestamp:2026-02-19 03:05:40.198207993 +0000 UTC m=+26.970427519,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}" 2026-02-19T03:08:13.851832336Z I0219 03:08:13.851706 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:08:13Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:55Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:14Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:13Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:13Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:08:15.537425889Z E0219 03:08:15.537321 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)" 2026-02-19T03:08:19.549296402Z W0219 03:08:19.549111 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-02-19T03:08:19.549296402Z E0219 03:08:19.549183 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-02-19T03:08:29.484359315Z E0219 03:08:29.484248 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused" 2026-02-19T03:08:31.242219152Z E0219 03:08:31.242125 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:08:41.861875194Z W0219 03:08:41.861758 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:08:41.861875194Z E0219 03:08:41.861841 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-02-19T03:08:47.719582912Z E0219 03:08:47.719424 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{authentication-operator.189586e38750fd3b openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-02-19 03:05:40.226088251 +0000 UTC m=+26.998307777,LastTimestamp:2026-02-19 03:05:40.226088251 +0000 UTC m=+26.998307777,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}" 2026-02-19T03:08:47.854889349Z E0219 03:08:47.854796 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:08:47.861948496Z I0219 03:08:47.861866 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:08:47Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:55Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:14Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:13Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:13Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:08:49.399448579Z W0219 03:08:49.399371 1 base_controller.go:242] Updating status of "WebhookAuthenticatorController" failed: unable to ApplyStatus for operator using fieldManager "WebhookAuthenticatorController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:08:49.399448579Z E0219 03:08:49.399430 1 base_controller.go:279] "Unhandled Error" err="WebhookAuthenticatorController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)" 2026-02-19T03:08:49.579480294Z E0219 03:08:49.579364 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps oauth-serving-cert)" 2026-02-19T03:08:49.604533387Z W0219 03:08:49.604407 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal 2026-02-19T03:08:49.604533387Z W0219 03:08:49.604434 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal 2026-02-19T03:09:02.520749480Z E0219 03:09:02.520649 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get endpoints oauth-openshift)" 2026-02-19T03:09:03.088081703Z E0219 03:09:03.087997 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-19T03:09:04.721069088Z W0219 03:09:04.720976 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:09:04.721069088Z E0219 03:09:04.721029 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)" 2026-02-19T03:09:04.921460268Z E0219 03:09:04.921344 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:09:05.322127536Z E0219 03:09:05.322051 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:09:08.563915541Z W0219 03:09:08.563779 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-02-19T03:09:08.563915541Z E0219 03:09:08.563856 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-02-19T03:09:15.540582091Z E0219 03:09:15.540485 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)" 2026-02-19T03:09:21.666093603Z E0219 03:09:21.665983 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-19T03:09:21.722157772Z E0219 03:09:21.722071 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{authentication-operator.189586e3ca877c7b openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\",Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-02-19 03:05:41.353733243 +0000 UTC m=+28.125952789,LastTimestamp:2026-02-19 03:05:41.353733243 +0000 UTC m=+28.125952789,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}" 2026-02-19T03:09:21.864973419Z E0219 03:09:21.864916 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:09:21.867166033Z I0219 03:09:21.867118 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:09:21Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:55Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:14Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:13Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:13Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:09:23.607785397Z E0219 03:09:23.607677 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:09:40.966581681Z W0219 03:09:40.966495 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:09:40.966581681Z E0219 03:09:40.966546 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-02-19T03:09:49.583096636Z E0219 03:09:49.583003 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps oauth-serving-cert)" 2026-02-19T03:09:55.725284472Z E0219 03:09:55.725191 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{authentication-operator.189586e405fa949a openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-02-19 03:05:42.351131802 +0000 UTC m=+29.123351358,LastTimestamp:2026-02-19 03:05:42.351131802 +0000 UTC m=+29.123351358,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}" 2026-02-19T03:09:55.870107917Z E0219 03:09:55.870001 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:09:55.872842657Z I0219 03:09:55.872701 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:09:55Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:55Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:14Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:13Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:13Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:10:02.524374928Z E0219 03:10:02.524228 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get endpoints oauth-openshift)" 2026-02-19T03:10:06.379347586Z W0219 03:10:06.378574 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-02-19T03:10:06.379347586Z E0219 03:10:06.378654 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-02-19T03:10:06.959049810Z E0219 03:10:06.958958 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused" 2026-02-19T03:10:13.659502478Z E0219 03:10:13.659409 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock?timeout=4m0s": context deadline exceeded 2026-02-19T03:10:13.659502478Z I0219 03:10:13.659469 1 leaderelection.go:297] failed to renew lease openshift-authentication-operator/cluster-authentication-operator-lock: timed out waiting for the condition 2026-02-19T03:10:15.544192774Z E0219 03:10:15.544100 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)" 2026-02-19T03:10:19.273310749Z E0219 03:10:19.273205 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-19T03:10:23.412534450Z W0219 03:10:23.412403 1 base_controller.go:242] Updating status of "WebhookAuthenticatorController" failed: unable to ApplyStatus for operator using fieldManager "WebhookAuthenticatorController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:10:23.412534450Z E0219 03:10:23.412486 1 base_controller.go:279] "Unhandled Error" err="WebhookAuthenticatorController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)" 2026-02-19T03:10:23.613610120Z W0219 03:10:23.613511 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal 2026-02-19T03:10:23.613610120Z W0219 03:10:23.613541 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal 2026-02-19T03:10:25.772185797Z W0219 03:10:25.772126 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-19T03:10:25.772225439Z E0219 03:10:25.772173 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-02-19T03:10:26.941991808Z W0219 03:10:26.941932 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal 2026-02-19T03:10:26.941991808Z W0219 03:10:26.941956 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal 2026-02-19T03:10:29.153318999Z I0219 03:10:29.153190 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded changed from False to True ("IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready") 2026-02-19T03:10:29.153912427Z I0219 03:10:29.153805 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:10:29Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:55Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:14Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:13Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:13Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:10:29.163239049Z E0219 03:10:29.163154 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-19T03:10:29.170587964Z I0219 03:10:29.170504 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:10:29Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:55Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:14Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:13Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:13Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:10:29.181892815Z E0219 03:10:29.181808 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-19T03:10:29.728660504Z E0219 03:10:29.728552 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{authentication-operator.189586e4a3802ca8 openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-02-19 03:05:44.993909928 +0000 UTC m=+31.766129464,LastTimestamp:2026-02-19 03:05:44.993909928 +0000 UTC m=+31.766129464,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}" 2026-02-19T03:10:31.916741433Z E0219 03:10:31.916574 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/serviceaccount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift), \"oauth-openshift/oauth-service.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services oauth-openshift), \"oauth-openshift/trust_distribution_role.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:oauth-servercert-trust), \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io system:openshift:oauth-servercert-trust), unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Timeout: request did not complete within requested timeout - context deadline exceeded]" 2026-02-19T03:10:38.730415338Z W0219 03:10:38.730329 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:10:38.730415338Z E0219 03:10:38.730387 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)" 2026-02-19T03:10:38.930956112Z E0219 03:10:38.930842 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:10:39.332930988Z E0219 03:10:39.332840 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2026-02-19T03:10:43.114713234Z E0219 03:10:43.114617 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)" 2026-02-19T03:10:43.122956255Z E0219 03:10:43.122882 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-19T03:10:43.122956255Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-02-19T03:10:43.122956255Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-02-19T03:10:43.122956255Z > 2026-02-19T03:10:43.126231271Z E0219 03:10:43.126130 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-19T03:10:43.126706545Z I0219 03:10:43.126626 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:09:55Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \"v4-0-config-system-service-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError::SystemServiceCAConfig_Error","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:55Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:14Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:13Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:13Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:10:43.143506136Z E0219 03:10:43.142470 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused" 2026-02-19T03:10:43.144141855Z I0219 03:10:43.144085 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:09:55Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \"v4-0-config-system-service-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError::SystemServiceCAConfig_Error","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:55Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:14Z","message":"APIServicesAvailable: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:13Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:13Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:10:43.144550887Z I0219 03:10:43.144515 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" to "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \"v4-0-config-system-service-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)" 2026-02-19T03:10:43.147731380Z E0219 03:10:43.147635 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-19T03:10:43.151459279Z E0219 03:10:43.151425 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused" 2026-02-19T03:10:43.154580410Z I0219 03:10:43.154512 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." to "APIServicesAvailable: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." 2026-02-19T03:10:45.686335728Z W0219 03:10:45.686227 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal 2026-02-19T03:10:45.686335728Z W0219 03:10:45.686294 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal 2026-02-19T03:10:45.717740697Z E0219 03:10:45.717647 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-19T03:10:45.717740697Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-02-19T03:10:45.717740697Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-02-19T03:10:45.717740697Z > 2026-02-19T03:10:45.724307919Z I0219 03:10:45.722114 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-19T03:09:55Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \"v4-0-config-system-service-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError::SystemServiceCAConfig_Error","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-02-19T03:05:55Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-19T03:05:14Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-19T03:05:13Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-19T03:05:13Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-19T03:10:45.724307919Z E0219 03:10:45.722875 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-02-19T03:10:45.735451045Z E0219 03:10:45.733873 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused" 2026-02-19T03:10:45.737098193Z I0219 03:10:45.737054 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "APIServicesAvailable: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." to "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." 2026-02-19T03:10:47.662204931Z E0219 03:10:47.662106 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-19T03:10:47.662724736Z W0219 03:10:47.662323 1 leaderelection.go:84] leader election lost 2026-02-19T03:10:47.662724736Z I0219 03:10:47.662346 1 base_controller.go:181] Shutting down ConfigObserver ... config/pod/openshift-authentication-operator/authentication-operator-5bd7c86784-cjz9l.json0000640000000000000000000001610315145477665030300 0ustar0000000000000000{"metadata":{"name":"authentication-operator-5bd7c86784-cjz9l","generateName":"authentication-operator-5bd7c86784-","namespace":"openshift-authentication-operator","uid":"b4c6dc8c-32c7-4c29-9ee8-a231d0bc2651","resourceVersion":"8061","creationTimestamp":"2026-02-19T03:03:33Z","labels":{"app":"authentication-operator","pod-template-hash":"5bd7c86784"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.26/23\"],\"mac_address\":\"0a:58:0a:80:00:1a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.26/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.26\"\n ],\n \"mac\": \"0a:58:0a:80:00:1a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-5bd7c86784","uid":"febbb517-9b40-4335-a8a5-db6fa82cb44b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-mj4rq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3167ddf67ad2f83e1a3f49ac6c7ee826469ce9ec16db6390f6a94dac24f6a346"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.33_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-mj4rq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c5"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:10:48Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:10:48Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.26","podIPs":[{"ip":"10.128.0.26"}],"startTime":"2026-02-19T03:04:48Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-02-19T03:10:47Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-19T03:05:13Z","finishedAt":"2026-02-19T03:10:47Z","containerID":"cri-o://9bdce3951fee565e17f2d28d3fa9bab8451b2a0d85b9fde5d5703fd5c2bc6773"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","containerID":"cri-o://8594432a4dd07eb45521a4c0409054b77862d25f28d0e8a9c4a239a4bc10a8ce","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-mj4rq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000002720215145477665020663 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T02:59:56Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:00:08Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-5c75f78c8b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:00:09Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c75f78c8b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:00:10Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5499d7f7bb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:00:10Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-5499d7f7bb to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:00:10Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-596f79dd6f-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:00:10Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-596f79dd6f to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:03:26Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:03:29Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c75f78c8b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:03:29Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-596f79dd6f-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:03:30Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5499d7f7bb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:03:31Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-596f79dd6f-sbzsk","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:03:32Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-5c75f78c8b-8tbg8","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:03:32Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-5499d7f7bb-kk77t","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:04:52Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:04:52Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:04:52Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:27Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.23/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:27Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:27Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.11/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:27Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:28Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:28Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:38Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" in 10.245s (10.245s including waiting). Image size: 862501144 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:38Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:38Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" in 10.465s (10.465s including waiting). Image size: 862501144 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:38Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:38Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:38Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:38Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" in 11.378s (11.378s including waiting). Image size: 862501144 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:05:39Z","reason":"LeaderElection","message":"package-server-manager-5c75f78c8b-8tbg8_1d2a34c4-7b87-44ce-a1f3-97c57c954cb7 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:11:11Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:11:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:11:14Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:11:14Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:11:36Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:12:30Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-7d77f88776-s4jxm","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:12:30Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:12:30Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:12:30Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-7d77f88776 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:12:30Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:12:30Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:12:31Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:12:31Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:12:31Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-19T03:12:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.64/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-route-controller-manager.json0000640000000000000000000001222615145477665020412 0ustar0000000000000000{"items":[{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-7867b8fb7b to 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:01Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-7867b8fb7b-r22wv","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:09Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:17Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:21Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-67f784c959-vwd2m","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:21Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-7867b8fb7b-r22wv","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-67f784c959 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-7867b8fb7b to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:39Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:40Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-67f784c959-vwd2m","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:40Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-84d87bdd5b-7p6kp","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-67f784c959 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-84d87bdd5b to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:45Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655\"","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:45Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.50/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:49Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.50:8443/healthz\": dial tcp 10.128.0.50:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:49Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.50:8443/healthz\": dial tcp 10.128.0.50:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:49Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655\" in 3.615s (3.615s including waiting). Image size: 486990304 bytes.","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:05:50Z","reason":"LeaderElection","message":"route-controller-manager-84d87bdd5b-7p6kp_6d560faa-8f3c-4ea6-96b2-f46bfcf1b488 became leader","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:11:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655\" already present on machine","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:11:16Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:11:16Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2026-02-19T03:11:16Z","reason":"LeaderElection","message":"route-controller-manager-84d87bdd5b-7p6kp_1239dbc4-fafb-4bce-b3bd-1e42aa6f3947 became leader","type":"Normal"}]}events/openshift-controller-manager.json0000640000000000000000000001303615145477665017256 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:00Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-6c9b8f4d95 to 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:01Z","reason":"FailedCreate","message":"Error creating: pods \"controller-manager-6c9b8f4d95-\" is forbidden: error looking up service account openshift-controller-manager/openshift-controller-manager-sa: serviceaccount \"openshift-controller-manager-sa\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-7444dc796b to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-6c9b8f4d95 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:01Z","reason":"FailedCreate","message":"Error creating: pods \"controller-manager-7444dc796b-\" is forbidden: error looking up service account openshift-controller-manager/openshift-controller-manager-sa: serviceaccount \"openshift-controller-manager-sa\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:01Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-7444dc796b-xwpkc","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:02Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-66b45cc56c to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:02Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-66b45cc56c-ghkxs","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:02Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-7444dc796b to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:02Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-7444dc796b-xwpkc","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:03Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:03Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:21Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-767fdf786d-rhhcr","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:21Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-66b45cc56c-ghkxs","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-66b45cc56c to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-767fdf786d to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:33Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:40Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-7d4cccb57c-sfb9j","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:40Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-767fdf786d-rhhcr","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-767fdf786d to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-7d4cccb57c to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:45Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74\"","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:05:45Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.51/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2026-02-19T03:11:15Z","reason":"LeaderElection","message":"controller-manager-7d4cccb57c-sfb9j became leader","type":"Normal"}]}events/openshift-controller-manager-operator.json0000640000000000000000000007571715145477665021125 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T02:59:54Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-controller-manager-operator-584cc7bcb5 to 1","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:00:04Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-584cc7bcb5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:03:29Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-584cc7bcb5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:03:31Z","reason":"SuccessfulCreate","message":"Created pod: openshift-controller-manager-operator-584cc7bcb5-c7c8v","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896\" in 3.568s (3.568s including waiting). Image size: 507867630 bytes.","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"LeaderElection","message":"openshift-controller-manager-operator-584cc7bcb5-c7c8v_5e77fa01-7e5a-4bb6-a01a-e220bd161d53 became leader","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to BuildCSIVolumes=true","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"build\": map[string]any{\n+ \t\t\"buildDefaults\": map[string]any{\"resources\": map[string]any{}},\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e7e373bb5\"...),\n+ \t\t},\n+ \t},\n+ \t\"controllers\": []any{\n+ \t\tstring(\"openshift.io/build\"), string(\"openshift.io/build-config-change\"),\n+ \t\tstring(\"openshift.io/builder-rolebindings\"),\n+ \t\tstring(\"openshift.io/builder-serviceaccount\"),\n+ \t\tstring(\"-openshift.io/default-rolebindings\"), string(\"openshift.io/deployer\"),\n+ \t\tstring(\"openshift.io/deployer-rolebindings\"),\n+ \t\tstring(\"openshift.io/deployer-serviceaccount\"),\n+ \t\tstring(\"openshift.io/deploymentconfig\"), string(\"openshift.io/image-import\"),\n+ \t\tstring(\"openshift.io/image-puller-rolebindings\"),\n+ \t\tstring(\"openshift.io/image-signature-import\"),\n+ \t\tstring(\"openshift.io/image-trigger\"), string(\"openshift.io/ingress-ip\"),\n+ \t\tstring(\"openshift.io/ingress-to-route\"),\n+ \t\tstring(\"openshift.io/origin-namespace\"), ...,\n+ \t},\n+ \t\"deployer\": map[string]any{\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f7696d1b6\"...),\n+ \t\t},\n+ \t},\n+ \t\"featureGates\": []any{string(\"BuildCSIVolumes=true\")},\n+ \t\"ingress\": map[string]any{\"ingressIPNetworkCIDR\": string(\"\")},\n  }\n","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftcontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-route-controller-manager\"}]","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ConfigMapCreateFailed","message":"Failed to create configmap/openshift-service-ca-n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/openshift-global-ca -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"DeploymentCreated","message":"Created Deployment.apps/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"DeploymentCreateFailed","message":"Failed to create Deployment.apps/route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/route-controller-manager-sa -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ServiceCreated","message":"Created Service/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:ingress-to-route-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ConfigMapCreated","message":"Created configmap/openshift-service-ca-n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/openshift-global-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"DeploymentCreated","message":"Created Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-openshift-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-controller-manager-sa -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ServiceCreated","message":"Created Service/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:update-buildconfig-status because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:deployer because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager:image-trigger-controller because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.openshift-global-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing changed from Unknown to True (\"Progressing: deployment/controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/controller-manager: updated replicas is 0, desired replicas is 1\\nProgressing: deployment/route-controller-manager: observed generation is 0, desired generation is 1.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: updated replicas is 0, desired replicas is 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\"),Available changed from Unknown to False (\"Available: no pods available on any node.\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"All is well\" to \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \" to \"All is well\",Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/controller-manager: updated replicas is 0, desired replicas is 1\\nProgressing: deployment/route-controller-manager: observed generation is 0, desired generation is 1.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: updated replicas is 0, desired replicas is 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\" to \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/controller-manager -n openshift-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:11:44Z","reason":"BackOff","message":"Back-off restarting failed container openshift-controller-manager-operator in pod openshift-controller-manager-operator-584cc7bcb5-c7c8v_openshift-controller-manager-operator(05c9cb4a-5249-4116-a2e5-caa7859e2075)","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:11:58Z","reason":"Created","message":"Created container: openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:11:58Z","reason":"Started","message":"Started container openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2026-02-19T03:11:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7bd3361d506dcc1be3afa62d35080c5dd37afccc26cd36019e2b9db2c45f896\" already present on machine","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001224515145477665015464 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:21Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-546884889b-hv7vs","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-546884889b to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-blcjh\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:24Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-546884889b-hv7vs","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:24Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-957b9456f-f5s8c","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:24Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-546884889b to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:24Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-957b9456f to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:25Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:27Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.39/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:38Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:38Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:38Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\" in 10.39s (10.39s including waiting). Image size: 589275174 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:39Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:39Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:39Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:39Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:41Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-19T03:05:41Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000011424515145477665017320 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T02:59:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-8586dccc9b to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:00:03Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-8586dccc9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:03:30Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-8586dccc9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:03:32Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-8586dccc9b-mcz8l","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.14/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\" in 513ms (513ms including waiting). Image size: 512172666 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"LeaderElection","message":"openshift-apiserver-operator-8586dccc9b-mcz8l_cb742458-b9b1-42de-ac94-0819bc299f5f became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:12Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-apiserver: namespaces \"openshift-apiserver\" not found","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:12Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:12Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:12Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:13Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:16Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:16Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:24Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.33\"}] to [{\"operator\" \"4.18.33\"} {\"openshift-apiserver\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:49Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:49Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:49Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:49Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:50Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:50Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:50Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:50Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:50Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:50Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:50Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:50Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/template.openshift.io/v1: 401\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:11:14Z","reason":"BackOff","message":"Back-off restarting failed container openshift-apiserver-operator in pod openshift-apiserver-operator-8586dccc9b-mcz8l_openshift-apiserver-operator(fbc2f7d0-4bae-4d4a-b041-a624ec2b9333)","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:11:25Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:11:25Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-19T03:11:25Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a9dcbc6b966928b7597d4a822948ae6f07b62feecb91679c1d825d0d19426e19\" already present on machine","type":"Normal"}]}events/openshift-cluster-olm-operator.json0000640000000000000000000011161715145477665017566 0ustar0000000000000000{"items":[{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T02:59:52Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-olm-operator-5bd7768f54 to 1","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:00:02Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-olm-operator-5bd7768f54-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:03:30Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-olm-operator-5bd7768f54-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:03:32Z","reason":"SuccessfulCreate","message":"Created pod: cluster-olm-operator-5bd7768f54-f8dfs","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.18/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:12Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:13Z","reason":"Created","message":"Created container: copy-catalogd-manifests","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:13Z","reason":"Started","message":"Started container copy-catalogd-manifests","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:13Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2\" in 907ms (907ms including waiting). Image size: 447940744 bytes.","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b\" in 10.9s (10.9s including waiting). Image size: 494959854 bytes.","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Created","message":"Created container: copy-operator-controller-manifests","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Started","message":"Started container copy-operator-controller-manifests","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:26Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:29Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7\" in 3.045s (3.045s including waiting). Image size: 511059399 bytes.","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:30Z","reason":"LeaderElection","message":"cluster-olm-operator-5bd7768f54-f8dfs_93f8ba1f-8494-4b8b-8c64-1fceec1cc4a7 became leader","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:30Z","reason":"OperatorVersionChanged","message":"clusteroperator/olm version \"operator\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/catalogd-leader-election-role -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"\" \"namespaces\" \"\" \"openshift-cluster-olm-operator\"} {\"operator.openshift.io\" \"olms\" \"\" \"cluster\"}] to [{\"\" \"namespaces\" \"\" \"openshift-catalogd\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"clustercatalogs.olm.operatorframework.io\"} {\"\" \"serviceaccounts\" \"openshift-catalogd\" \"catalogd-controller-manager\"} {\"rbac.authorization.k8s.io\" \"roles\" \"openshift-catalogd\" \"catalogd-leader-election-role\"} {\"rbac.authorization.k8s.io\" \"roles\" \"openshift-config\" \"catalogd-manager-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"catalogd-manager-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"catalogd-metrics-reader\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"catalogd-proxy-role\"} {\"rbac.authorization.k8s.io\" \"rolebindings\" \"openshift-catalogd\" \"catalogd-leader-election-rolebinding\"} {\"rbac.authorization.k8s.io\" \"rolebindings\" \"openshift-config\" \"catalogd-manager-rolebinding\"} {\"rbac.authorization.k8s.io\" \"clusterrolebindings\" \"\" \"catalogd-manager-rolebinding\"} {\"rbac.authorization.k8s.io\" \"clusterrolebindings\" \"\" \"catalogd-proxy-rolebinding\"} {\"\" \"configmaps\" \"openshift-catalogd\" \"catalogd-trusted-ca-bundle\"} {\"\" \"services\" \"openshift-catalogd\" \"catalogd-service\"} {\"apps\" \"deployments\" \"openshift-catalogd\" \"catalogd-controller-manager\"} {\"olm.operatorframework.io\" \"clustercatalogs\" \"\" \"openshift-certified-operators\"} {\"olm.operatorframework.io\" \"clustercatalogs\" \"\" \"openshift-community-operators\"} {\"olm.operatorframework.io\" \"clustercatalogs\" \"\" \"openshift-redhat-marketplace\"} {\"olm.operatorframework.io\" \"clustercatalogs\" \"\" \"openshift-redhat-operators\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"catalogd-mutating-webhook-configuration\"} {\"\" \"namespaces\" \"\" \"openshift-operator-controller\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"clusterextensions.olm.operatorframework.io\"} {\"\" \"serviceaccounts\" \"openshift-operator-controller\" \"operator-controller-controller-manager\"} {\"rbac.authorization.k8s.io\" \"roles\" \"openshift-config\" \"operator-controller-manager-role\"} {\"rbac.authorization.k8s.io\" \"roles\" \"openshift-operator-controller\" \"operator-controller-leader-election-role\"} {\"rbac.authorization.k8s.io\" \"roles\" \"openshift-operator-controller\" \"operator-controller-manager-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-clusterextension-editor-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-clusterextension-viewer-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-extension-editor-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-extension-viewer-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-manager-role\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-metrics-reader\"} {\"rbac.authorization.k8s.io\" \"clusterroles\" \"\" \"operator-controller-proxy-role\"} {\"rbac.authorization.k8s.io\" \"rolebindings\" \"openshift-config\" \"operator-controller-manager-rolebinding\"} {\"rbac.authorization.k8s.io\" \"rolebindings\" \"openshift-operator-controller\" \"operator-controller-leader-election-rolebinding\"} {\"rbac.authorization.k8s.io\" \"rolebindings\" \"openshift-operator-controller\" \"operator-controller-manager-rolebinding\"} {\"rbac.authorization.k8s.io\" \"clusterrolebindings\" \"\" \"operator-controller-manager-rolebinding\"} {\"rbac.authorization.k8s.io\" \"clusterrolebindings\" \"\" \"operator-controller-proxy-rolebinding\"} {\"\" \"configmaps\" \"openshift-operator-controller\" \"operator-controller-trusted-ca-bundle\"} {\"\" \"services\" \"openshift-operator-controller\" \"operator-controller-controller-manager-metrics-service\"} {\"apps\" \"deployments\" \"openshift-operator-controller\" \"operator-controller-controller-manager\"} {\"operator.openshift.io\" \"olms\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-cluster-olm-operator\"}],status.versions changed from [] to [{\"operator\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"CustomResourceDefinitionCreated","message":"Created CustomResourceDefinition.apiextensions.k8s.io/clustercatalogs.olm.operatorframework.io because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"CustomResourceDefinitionCreated","message":"Created CustomResourceDefinition.apiextensions.k8s.io/clusterextensions.olm.operatorframework.io because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/catalogd-controller-manager -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/operator-controller-controller-manager -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/operator-controller-manager-role -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/catalogd-manager-role -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/operator-controller-leader-election-role -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/catalogd-manager-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/operator-controller-manager-role -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:32Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/catalogd-metrics-reader because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:32Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-clusterextension-editor-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-clusterextension-viewer-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/catalogd-proxy-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:34Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/catalogd-leader-election-rolebinding -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:34Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-extension-editor-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-extension-viewer-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/catalogd-manager-rolebinding -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-manager-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/catalogd-manager-rolebinding because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:36Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-metrics-reader because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/catalogd-proxy-rolebinding because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/catalogd-trusted-ca-bundle -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:36Z","reason":"ServiceCreated","message":"Created Service/catalogd-service -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:36Z","reason":"MutatingWebhookConfigurationCreated","message":"Created MutatingWebhookConfiguration.admissionregistration.k8s.io/catalogd-mutating-webhook-configuration because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:37Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/operator-controller-proxy-role because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:38Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/operator-controller-manager-rolebinding -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:38Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/operator-controller-leader-election-rolebinding -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/operator-controller-manager-rolebinding -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded message changed from \"CatalogdClusterCatalogOpenshiftRedhatMarketplaceDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\" to \"CatalogdClusterCatalogOpenshiftRedhatMarketplaceDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded message changed from \"All is well\" to \"CatalogdClusterCatalogOpenshiftRedhatMarketplaceDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"MutatingWebhookConfigurationUpdated","message":"Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/catalogd-mutating-webhook-configuration because it changed","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/operator-controller-manager-rolebinding because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"DeploymentCreated","message":"Created Deployment.apps/catalogd-controller-manager -n openshift-catalogd because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"DeploymentCreated","message":"Created Deployment.apps/operator-controller-controller-manager -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded message changed from \"CatalogdClusterCatalogOpenshiftRedhatMarketplaceDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\" to \"CatalogdClusterCatalogOpenshiftRedhatMarketplaceDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded message changed from \"CatalogdClusterCatalogOpenshiftRedhatMarketplaceDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\" to \"CatalogdClusterCatalogOpenshiftRedhatMarketplaceDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Progressing changed from Unknown to True (\"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to act on changes\"),Available changed from Unknown to False (\"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\")","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Progressing message changed from \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to act on changes\" to \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to act on changes\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to act on changes\",Available message changed from \"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\" to \"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/operator-controller-trusted-ca-bundle -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/operator-controller-proxy-rolebinding because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:41Z","reason":"ServiceCreated","message":"Created Service/operator-controller-controller-manager-metrics-service -n openshift-operator-controller because it was missing","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Progressing message changed from \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to act on changes\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to act on changes\" to \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to act on changes\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Progressing message changed from \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to act on changes\" to \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded message changed from \"CatalogdClusterCatalogOpenshiftRedhatMarketplaceDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\" to \"CatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded message changed from \"CatalogdClusterCatalogOpenshiftCertifiedOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\" to \"CatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded message changed from \"CatalogdClusterCatalogOpenshiftRedhatOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\\nCatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\" to \"CatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Degraded message changed from \"CatalogdClusterCatalogOpenshiftCommunityOperatorsDegraded: Internal error occurred: failed calling webhook \\\"inject-metadata-name.olm.operatorframework.io\\\": failed to call webhook: Post \\\"https://catalogd-service.openshift-catalogd.svc:9443/mutate-olm-operatorframework-io-v1-clustercatalog?timeout=10s\\\": no endpoints available for service \\\"catalogd-service\\\"\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/olm changed: Progressing message changed from \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerProgressing: Waiting for Deployment to deploy pods\" to \"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods\",Available message changed from \"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\\nOperatorcontrollerDeploymentOperatorControllerControllerManagerAvailable: Waiting for Deployment\" to \"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment\"","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:11:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:11:05Z","reason":"Created","message":"Created container: cluster-olm-operator","type":"Normal"},{"namespace":"openshift-cluster-olm-operator","lastTimestamp":"2026-02-19T03:11:05Z","reason":"Started","message":"Started container cluster-olm-operator","type":"Normal"}]}events/openshift-operator-controller.json0000640000000000000000000000707315145477665017503 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:05:40Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"ca-certs\" : configmap \"operator-controller-trusted-ca-bundle\" not found","type":"Warning"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set operator-controller-controller-manager-9cc7d7bb to 1","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:05:40Z","reason":"SuccessfulCreate","message":"Created pod: operator-controller-controller-manager-9cc7d7bb-s559q","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:05:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"ca-certs\" : configmap references non-existent config key: ca-bundle.crt","type":"Warning"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:05:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:05:43Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:05:43Z","reason":"LeaderElection","message":"operator-controller-controller-manager-9cc7d7bb-s559q_dea75091-64df-407c-8d0e-84e77f1cb82d became leader","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:05:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:05:43Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:08:02Z","reason":"ProbeError","message":"Liveness probe error: Get \"http://10.128.0.45:8081/healthz\": dial tcp 10.128.0.45:8081: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:08:02Z","reason":"ProbeError","message":"Readiness probe error: Get \"http://10.128.0.45:8081/readyz\": dial tcp 10.128.0.45:8081: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:08:02Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"http://10.128.0.45:8081/readyz\": dial tcp 10.128.0.45:8081: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:08:02Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"http://10.128.0.45:8081/healthz\": dial tcp 10.128.0.45:8081: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:08:09Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:08:10Z","reason":"Started","message":"Started container manager","type":"Normal"},{"namespace":"openshift-operator-controller","lastTimestamp":"2026-02-19T03:08:10Z","reason":"Created","message":"Created container: manager","type":"Normal"}]}events/openshift-catalogd.json0000640000000000000000000000562415145477665015245 0ustar0000000000000000{"items":[{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:05:40Z","reason":"SuccessfulCreate","message":"Created pod: catalogd-controller-manager-84b8d9d697-jhj9q","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalogd-controller-manager-84b8d9d697 to 1","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:05:41Z","reason":"Started","message":"Started container manager","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:05:41Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:05:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2\" already present on machine","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:05:41Z","reason":"Created","message":"Created container: manager","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:05:41Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:05:41Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:05:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52\" already present on machine","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:05:41Z","reason":"LeaderElection","message":"catalogd-controller-manager-84b8d9d697-jhj9q_e0752619-22b8-4120-b027-3d504f4c32a2 became leader","type":"Normal"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:08:40Z","reason":"ProbeError","message":"Liveness probe error: Get \"http://10.128.0.44:8081/healthz\": dial tcp 10.128.0.44:8081: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:08:40Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"http://10.128.0.44:8081/healthz\": dial tcp 10.128.0.44:8081: connect: connection refused","type":"Warning"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:08:50Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"http://10.128.0.44:8081/readyz\": dial tcp 10.128.0.44:8081: connect: connection refused","type":"Warning"},{"namespace":"openshift-catalogd","lastTimestamp":"2026-02-19T03:09:00Z","reason":"ProbeError","message":"Readiness probe error: Get \"http://10.128.0.44:8081/readyz\": dial tcp 10.128.0.44:8081: connect: connection refused\nbody: \n","type":"Warning"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007723015145477665020224 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T02:59:52Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-77cd4d9559 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:00:02Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-77cd4d9559-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:03:29Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-77cd4d9559-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:03:31Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-77cd4d9559-w5pp8","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" in 2.986s (2.986s including waiting). Image size: 506291135 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-77cd4d9559-w5pp8_cb0bf79d-a44c-498e-9691-5b9a1ac66d6b became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:05Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:13Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:16Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:18Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:20Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:23Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:23Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:24Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:32Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:32Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:41Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:43Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:44Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:45Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:05:50Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:11:19Z","reason":"BackOff","message":"Back-off restarting failed container kube-scheduler-operator-container in pod openshift-kube-scheduler-operator-77cd4d9559-w5pp8_openshift-kube-scheduler-operator(5301cbc9-b3f3-4b2d-a114-1ba0752462f1)","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:11:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:11:31Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-02-19T03:11:31Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000001777015145477665016376 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:25Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.33/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:28Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.40/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:39Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:39Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:40Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:42Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:42Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:05:48Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:07:04Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-4-master-0_openshift-kube-scheduler_66b05aeb-22a8-4008-a582-072f63cc46bf_0(5c576a2a93d8c627211803bcb78bfc7cad7b9ea93e9cc21c7386850adfe908a0): error adding pod openshift-kube-scheduler_installer-4-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"5c576a2a93d8c627211803bcb78bfc7cad7b9ea93e9cc21c7386850adfe908a0\" Netns:\"/var/run/netns/e1d1a539-f255-4bbd-b242-4023794701d2\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-scheduler;K8S_POD_NAME=installer-4-master-0;K8S_POD_INFRA_CONTAINER_ID=5c576a2a93d8c627211803bcb78bfc7cad7b9ea93e9cc21c7386850adfe908a0;K8S_POD_UID=66b05aeb-22a8-4008-a582-072f63cc46bf\" Path:\"\" ERRORED: error configuring pod [openshift-kube-scheduler/installer-4-master-0] networking: Multus: [openshift-kube-scheduler/installer-4-master-0/66b05aeb-22a8-4008-a582-072f63cc46bf]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-4-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-4-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-4-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:08:05Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-4-master-0_openshift-kube-scheduler_66b05aeb-22a8-4008-a582-072f63cc46bf_0(33708ff813eba88751e687033dbb108c40972345da5835166ddc3a53806b66ed): error adding pod openshift-kube-scheduler_installer-4-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"33708ff813eba88751e687033dbb108c40972345da5835166ddc3a53806b66ed\" Netns:\"/var/run/netns/0a33b13c-179e-491a-9eab-2e76b6c979eb\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-scheduler;K8S_POD_NAME=installer-4-master-0;K8S_POD_INFRA_CONTAINER_ID=33708ff813eba88751e687033dbb108c40972345da5835166ddc3a53806b66ed;K8S_POD_UID=66b05aeb-22a8-4008-a582-072f63cc46bf\" Path:\"\" ERRORED: error configuring pod [openshift-kube-scheduler/installer-4-master-0] networking: Multus: [openshift-kube-scheduler/installer-4-master-0/66b05aeb-22a8-4008-a582-072f63cc46bf]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-4-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-4-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-4-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:09:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.53/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:10:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8618d42fe4da4881abe39e98691d187e13713981b66d0dac0a11cb1287482b7\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:10:29Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:10:29Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-02-19T03:11:56Z","reason":"StaticPodInstallerFailed","message":"Installing revision 4: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/secrets/localhost-recovery-client-token-4?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)","type":"Warning"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000012526215145477665022040 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T02:59:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-7bcfbc574b to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:00:03Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-7bcfbc574b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:03:29Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-7bcfbc574b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:03:31Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-7bcfbc574b-k7xlc","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\" in 3.316s (3.317s including waiting). Image size: 508786786 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"LeaderElection","message":"kube-controller-manager-operator-7bcfbc574b-k7xlc_38fdad7d-1159-4016-a3f5-3a2120550d2a became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-c75j2\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:05Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:05Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n  \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-c75j2\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n  \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n  \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:09Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:11Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:13Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:13Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:18Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:25Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:29Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:32Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:37Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.8:40148-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.8:40148-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.8:47043-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.8:47043-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:46Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:49Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:11:19Z","reason":"BackOff","message":"Back-off restarting failed container kube-controller-manager-operator in pod kube-controller-manager-operator-7bcfbc574b-k7xlc_openshift-kube-controller-manager-operator(6c9ed390-3b62-4b81-8c03-0c579a4a686a)","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:11:30Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:11:31Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-19T03:11:31Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000001460315145477665020203 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:05:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.41/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:05:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:05:39Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:05:39Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:05:52Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:07:05Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_d10d2e5a-c822-4f86-b6f1-2da4ee6cc9d4_0(defa2c42dd7bd96ef1dd842a6997242fdc7a87777361c290876077be8074caeb): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"defa2c42dd7bd96ef1dd842a6997242fdc7a87777361c290876077be8074caeb\" Netns:\"/var/run/netns/51f863ae-bb6e-4150-afb9-8d7418b17979\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=defa2c42dd7bd96ef1dd842a6997242fdc7a87777361c290876077be8074caeb;K8S_POD_UID=d10d2e5a-c822-4f86-b6f1-2da4ee6cc9d4\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/d10d2e5a-c822-4f86-b6f1-2da4ee6cc9d4]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:08:06Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-2-master-0_openshift-kube-controller-manager_d10d2e5a-c822-4f86-b6f1-2da4ee6cc9d4_0(8e4ebea3ed448e91b658f6e9f646155d0c42790e55575e30c564e00306b9be28): error adding pod openshift-kube-controller-manager_installer-2-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"8e4ebea3ed448e91b658f6e9f646155d0c42790e55575e30c564e00306b9be28\" Netns:\"/var/run/netns/c15c223d-6b03-4ed7-8eaf-67b2dd54ad96\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager;K8S_POD_NAME=installer-2-master-0;K8S_POD_INFRA_CONTAINER_ID=8e4ebea3ed448e91b658f6e9f646155d0c42790e55575e30c564e00306b9be28;K8S_POD_UID=d10d2e5a-c822-4f86-b6f1-2da4ee6cc9d4\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager/installer-2-master-0] networking: Multus: [openshift-kube-controller-manager/installer-2-master-0/d10d2e5a-c822-4f86-b6f1-2da4ee6cc9d4]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-2-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-2-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:09:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.54/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:10:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64ba461fd5594e3a30bfd755f1496707a88249bc68d07c65124c8617d664d2ac\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:10:29Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:10:29Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-19T03:11:56Z","reason":"StaticPodInstallerFailed","message":"Installing revision 2: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/secrets/localhost-recovery-client-token-2?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)","type":"Warning"}]}events/openshift-kube-apiserver.json0000640000000000000000000001234315145477665016407 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-19T03:07:05Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-1-master-0_openshift-kube-apiserver_1bddb3a1-41bd-4314-bfb0-3c72ca14200f_0(9db37ce9f2600f705d8700b3cbb2e6faf9dd7aea68dbc2030205aeeb7ac51415): error adding pod openshift-kube-apiserver_installer-1-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"9db37ce9f2600f705d8700b3cbb2e6faf9dd7aea68dbc2030205aeeb7ac51415\" Netns:\"/var/run/netns/b1b09fe3-323f-484f-a83d-102558ae899f\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-apiserver;K8S_POD_NAME=installer-1-master-0;K8S_POD_INFRA_CONTAINER_ID=9db37ce9f2600f705d8700b3cbb2e6faf9dd7aea68dbc2030205aeeb7ac51415;K8S_POD_UID=1bddb3a1-41bd-4314-bfb0-3c72ca14200f\" Path:\"\" ERRORED: error configuring pod [openshift-kube-apiserver/installer-1-master-0] networking: Multus: [openshift-kube-apiserver/installer-1-master-0/1bddb3a1-41bd-4314-bfb0-3c72ca14200f]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-1-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-1-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-apiserver/pods/installer-1-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-19T03:08:06Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_installer-1-master-0_openshift-kube-apiserver_1bddb3a1-41bd-4314-bfb0-3c72ca14200f_0(967fbbc9f47a88120504e97a601fcf98699409a0efbc5569e66cc3b675e7f84f): error adding pod openshift-kube-apiserver_installer-1-master-0 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"967fbbc9f47a88120504e97a601fcf98699409a0efbc5569e66cc3b675e7f84f\" Netns:\"/var/run/netns/022b6cc3-732e-4cd5-a252-382db37429c5\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-apiserver;K8S_POD_NAME=installer-1-master-0;K8S_POD_INFRA_CONTAINER_ID=967fbbc9f47a88120504e97a601fcf98699409a0efbc5569e66cc3b675e7f84f;K8S_POD_UID=1bddb3a1-41bd-4314-bfb0-3c72ca14200f\" Path:\"\" ERRORED: error configuring pod [openshift-kube-apiserver/installer-1-master-0] networking: Multus: [openshift-kube-apiserver/installer-1-master-0/1bddb3a1-41bd-4314-bfb0-3c72ca14200f]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod installer-1-master-0 in out of cluster comm: SetNetworkStatus: failed to update the pod installer-1-master-0 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-apiserver/pods/installer-1-master-0?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-19T03:09:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.52/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-19T03:10:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-19T03:10:29Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-19T03:10:29Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-19T03:11:56Z","reason":"StaticPodInstallerFailed","message":"Installing revision 1: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/etcd-client-1?timeout=14s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)","type":"Warning"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000021322215145477665020237 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:00:08Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-5d87bf58c to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:00:10Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-5d87bf58c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:03:31Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-5d87bf58c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:03:33Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-5d87bf58c-lbfvq","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:50Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:50Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:50Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:50Z","reason":"LeaderElection","message":"kube-apiserver-operator-5d87bf58c-lbfvq_9a5965d8-4eda-40b2-92fe-c3a8bd303026 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:50Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:51Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:51Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:51Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:51Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to False (\"All is well\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:51Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:52Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:52Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:52Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:52Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"All is well\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:54Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:54Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:54Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:54Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:56Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:56Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:56Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:56Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:56Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:57Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:57Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:57Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:57Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:00Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:05Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:09Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:09Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:11Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:12Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:24Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n  \t\"admission\": map[string]any{\"pluginConfig\": map[string]any{\"PodSecurity\": map[string]any{\"configuration\": map[string]any{\"defaults\": map[string]any{\"audit\": string(\"restricted\"), \"audit-version\": string(\"latest\"), \"enforce\": string(\"privileged\"), \"enforce-version\": string(\"latest\"), ...}}}, \"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{\"allowIngressIP\": bool(false), \"apiVersion\": string(\"network.openshift.io/v1\"), \"kind\": string(\"ExternalIPRangerAdmissionConfig\")}}, \"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{\"apiVersion\": string(\"network.openshift.io/v1\"), \"kind\": string(\"RestrictedEndpointsAdmissionConfig\"), \"restrictedCIDRs\": []any{string(\"10.128.0.0/16\"), string(\"172.30.0.0/16\")}}}}},\n  \t\"apiServerArguments\": map[string]any{\n  \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"authentication-token-webhook-config-file\": []any{\n+ \t\t\tstring(\"/etc/kubernetes/static-pod-resources/secrets/webhook-authenticator/kubeConfig\"),\n+ \t\t},\n+ \t\t\"authentication-token-webhook-version\": []any{string(\"v1\")},\n  \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n  \t\t\"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n  \t\t... // 6 identical entries\n  \t},\n  \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n  \t\"gracefulTerminationDuration\": string(\"15\"),\n  \t... // 2 identical entries\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"ObserveWebhookTokenAuthenticator","message":"authentication-token webhook configuration status changed from false to true","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"SecretCreated","message":"Created Secret/webhook-authenticator -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:37Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:39Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:41Z","reason":"SecretCreated","message":"Created Secret/webhook-authenticator-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:42Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:42Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:43Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-apiserver:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:43Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:45Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:49Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:05:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:11:20Z","reason":"BackOff","message":"Back-off restarting failed container kube-apiserver-operator in pod kube-apiserver-operator-5d87bf58c-lbfvq_openshift-kube-apiserver-operator(4714ef51-2d24-4938-8c58-80c1485a368b)","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:11:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:11:34Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-19T03:11:34Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001260615145477665014404 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:05:25Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.36/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:05:56Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:06:09Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:06:10Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:06:10Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:06:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:06:37Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:06:37Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:08:22Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:08:23Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:08:23Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:05Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:05Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:05Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:05Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:05Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:05Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:06Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:06Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:06Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-02-19T03:10:06Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000003333115145477665016233 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T02:59:55Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-545bf96f4d to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:00:06Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-545bf96f4d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:03:31Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-545bf96f4d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:03:33Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-545bf96f4d-r7r6p","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:58Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" in 3.305s (3.305s including waiting). Image size: 518279996 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded changed from Unknown to False (\"ScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"LeaderElection","message":"etcd-operator-545bf96f4d-r7r6p_f76d56d8-f8ce-4548-bc62-eef4dcd348d4 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:04:59Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:01Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:03Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:05Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:07Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:08Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:10:35Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.22:8443/healthz\": dial tcp 10.128.0.22:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:10:35Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.22:8443/healthz\": dial tcp 10.128.0.22:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:10:35Z","reason":"Killing","message":"Container etcd-operator failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:11:35Z","reason":"BackOff","message":"Back-off restarting failed container etcd-operator in pod etcd-operator-545bf96f4d-r7r6p_openshift-etcd-operator(4c3267e5-390a-40a3-bff8-1d1d81fb9a17)","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:11:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:11:48Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-19T03:11:48Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000410615145477665016577 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-19T03:05:41Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-85f97c6ffb-qfcnk","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-19T03:05:41Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-85f97c6ffb to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-19T03:05:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-19T03:05:42Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-19T03:05:45Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\" in 3.204s (3.204s including waiting). Image size: 505244089 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-19T03:05:45Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-19T03:05:45Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-19T03:05:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-19T03:05:47Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-19T03:05:47Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000056015145477665015133 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-02-19T03:05:26Z","reason":"SuccessfulCreate","message":"Created pod: router-default-7b65dc9fcb-t6jnq","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-19T03:05:26Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-7b65dc9fcb to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000020520615145477665020335 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T02:59:56Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-5bd7c86784 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:00:06Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5bd7c86784-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:03:30Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5bd7c86784-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:03:33Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-5bd7c86784-cjz9l","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:04:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.26/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:04:50Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:04:57Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:04:57Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:10Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:12Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\" in 2.149s (2.149s including waiting). Image size: 513119434 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:13Z","reason":"LeaderElection","message":"authentication-operator-5bd7c86784-cjz9l_ac72c83b-50dd-445e-96a1-07e4785d8121 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available changed from Unknown to False (\"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to False (\"All is well\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:14Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:17Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:20Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on authentications.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:20Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthAPIServerConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on authentications.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthAPIServerConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on authentications.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-svqs7\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-svqs7\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthAPIServerConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on authentications.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthAPIServerConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on authentications.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthAPIServerConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on authentications.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthAPIServerConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on authentications.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthAPIServerConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on authentications.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthAPIServerConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on authentications.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:21Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:23Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:24Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:24Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:26Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:27Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:30Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:32Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:32Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:32Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"SecretCreated","message":"Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:35Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:41Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.33\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.33\"}] to [{\"operator\" \"4.18.33\"} {\"oauth-apiserver\" \"4.18.33\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:05:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:10:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:10:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \\\"v4-0-config-system-service-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:10:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:10:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.150.168:443/healthz\\\": dial tcp 172.30.150.168:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:10:47Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:10:47Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-19T03:10:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e\" already present on machine","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015145477665016314 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-19T03:05:27Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-19T03:05:27Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003477315145477652014636 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":338,"namespaces":{"default":[{"name":"builder","secrets":0},{"name":"default","secrets":1},{"name":"deployer","secrets":0}],"kube-public":[{"name":"builder","secrets":0},{"name":"default","secrets":1},{"name":"deployer","secrets":0}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":0},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":0},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":0},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":0},{"name":"root-ca-cert-publisher","secrets":0},{"name":"service-account-controller","secrets":0},{"name":"service-ca-cert-publisher","secrets":0},{"name":"statefulset-controller","secrets":0},{"name":"ttl-after-finished-controller","secrets":0},{"name":"validatingadmissionpolicy-status-controller","secrets":0}],"openshift":[{"name":"builder","secrets":0},{"name":"default","secrets":0},{"name":"deployer","secrets":0}],"openshift-apiserver":[{"name":"builder","secrets":0},{"name":"default","secrets":0},{"name":"deployer","secrets":0},{"name":"openshift-apiserver-sa","secrets":0}],"openshift-apiserver-operator":[{"name":"builder","secrets":0},{"name":"default","secrets":1},{"name":"deployer","secrets":0},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":0},{"name":"default","secrets":0},{"name":"deployer","secrets":0},{"name":"oauth-openshift","secrets":0}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":0},{"name":"default","secrets":1},{"name":"deployer","secrets":0}],"openshift-catalogd":[{"name":"builder","secrets":0},{"name":"catalogd-controller-manager","secrets":0},{"name":"default","secrets":0},{"name":"deployer","secrets":0}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":0},{"name":"cloud-controller-manager","secrets":0},{"name":"cloud-node-manager","secrets":0},{"name":"default","secrets":1},{"name":"deployer","secrets":0}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":0},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":0}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":0},{"name":"cloud-credential-operator","secrets":0},{"name":"default","secrets":1},{"name":"deployer","secrets":0}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":0},{"name":"default","secrets":1},{"name":"deployer","secrets":0}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-os-puller","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015145477651014112 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000005641215145477636014563 0ustar0000000000000000Feb 19 03:11:39.503335 master-0 kubenswrapper[7776]: E0219 03:11:39.503158 7776 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Feb 19 03:11:39.503480 master-0 kubenswrapper[7776]: E0219 03:11:39.503466 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls podName:255784ad-b52a-4c5c-ad15-278865ee2ccb nodeName:}" failed. No retries permitted until 2026-02-19 03:11:40.503444386 +0000 UTC m=+406.843128904 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls") pod "machine-api-operator-5c7cf458b4-prbs7" (UID: "255784ad-b52a-4c5c-ad15-278865ee2ccb") : secret "machine-api-operator-tls" not found Feb 19 03:11:40.515400 master-0 kubenswrapper[7776]: E0219 03:11:40.514733 7776 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Feb 19 03:11:40.515400 master-0 kubenswrapper[7776]: E0219 03:11:40.514784 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls podName:255784ad-b52a-4c5c-ad15-278865ee2ccb nodeName:}" failed. No retries permitted until 2026-02-19 03:11:42.514771139 +0000 UTC m=+408.854455657 (durationBeforeRetry 2s). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls") pod "machine-api-operator-5c7cf458b4-prbs7" (UID: "255784ad-b52a-4c5c-ad15-278865ee2ccb") : secret "machine-api-operator-tls" not found Feb 19 03:11:40.817876 master-0 kubenswrapper[7776]: E0219 03:11:40.817790 7776 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Feb 19 03:11:40.817922 master-0 kubenswrapper[7776]: E0219 03:11:40.817905 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/33bb562f-84e7-4fcb-b008-416c09a5ecf0-cert podName:33bb562f-84e7-4fcb-b008-416c09a5ecf0 nodeName:}" failed. No retries permitted until 2026-02-19 03:11:44.817882304 +0000 UTC m=+411.157566862 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/33bb562f-84e7-4fcb-b008-416c09a5ecf0-cert") pod "cluster-autoscaler-operator-86b8dc6d6-pd8lj" (UID: "33bb562f-84e7-4fcb-b008-416c09a5ecf0") : secret "cluster-autoscaler-operator-cert" not found Feb 19 03:11:40.919567 master-0 kubenswrapper[7776]: E0219 03:11:40.919283 7776 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Feb 19 03:11:40.919567 master-0 kubenswrapper[7776]: E0219 03:11:40.919391 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/858a717b-a44e-4b8d-9974-7451a89cf104-cloud-credential-operator-serving-cert podName:858a717b-a44e-4b8d-9974-7451a89cf104 nodeName:}" failed. No retries permitted until 2026-02-19 03:11:44.919367594 +0000 UTC m=+411.259052182 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/858a717b-a44e-4b8d-9974-7451a89cf104-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-6968c58f46-p2hfn" (UID: "858a717b-a44e-4b8d-9974-7451a89cf104") : secret "cloud-credential-operator-serving-cert" not found Feb 19 03:11:40.919567 master-0 kubenswrapper[7776]: E0219 03:11:40.919394 7776 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Feb 19 03:11:40.919567 master-0 kubenswrapper[7776]: E0219 03:11:40.919480 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/afee48d5-7b45-42ef-acc8-e591ec479974-machine-approver-tls podName:afee48d5-7b45-42ef-acc8-e591ec479974 nodeName:}" failed. No retries permitted until 2026-02-19 03:11:44.919455477 +0000 UTC m=+411.259140035 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/afee48d5-7b45-42ef-acc8-e591ec479974-machine-approver-tls") pod "machine-approver-798b897698-hmpmj" (UID: "afee48d5-7b45-42ef-acc8-e591ec479974") : secret "machine-approver-tls" not found Feb 19 03:11:40.919784 master-0 kubenswrapper[7776]: E0219 03:11:40.919588 7776 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Feb 19 03:11:40.919784 master-0 kubenswrapper[7776]: E0219 03:11:40.919638 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/59cea4cb-6374-49b6-97b3-d8a19cc1860f-samples-operator-tls podName:59cea4cb-6374-49b6-97b3-d8a19cc1860f nodeName:}" failed. No retries permitted until 2026-02-19 03:11:44.919626452 +0000 UTC m=+411.259311020 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/59cea4cb-6374-49b6-97b3-d8a19cc1860f-samples-operator-tls") pod "cluster-samples-operator-65c5c48b9b-hl874" (UID: "59cea4cb-6374-49b6-97b3-d8a19cc1860f") : secret "samples-operator-tls" not found Feb 19 03:11:42.552459 master-0 kubenswrapper[7776]: E0219 03:11:42.552361 7776 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Feb 19 03:11:42.552505 master-0 kubenswrapper[7776]: E0219 03:11:42.552482 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls podName:255784ad-b52a-4c5c-ad15-278865ee2ccb nodeName:}" failed. No retries permitted until 2026-02-19 03:11:46.552463996 +0000 UTC m=+412.892148514 (durationBeforeRetry 4s). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls") pod "machine-api-operator-5c7cf458b4-prbs7" (UID: "255784ad-b52a-4c5c-ad15-278865ee2ccb") : secret "machine-api-operator-tls" not found Feb 19 03:11:43.276279 master-0 kubenswrapper[7776]: E0219 03:11:43.276190 7776 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-rbac-proxy\" with CrashLoopBackOff: \"back-off 10s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p_openshift-cloud-controller-manager-operator(72a6892f-5a69-434b-9dea-11ad5de62a40)\"" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p" podUID="72a6892f-5a69-434b-9dea-11ad5de62a40" Feb 19 03:11:44.284600 master-0 kubenswrapper[7776]: E0219 03:11:44.284560 7776 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-rbac-proxy\" with CrashLoopBackOff: \"back-off 10s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p_openshift-cloud-controller-manager-operator(72a6892f-5a69-434b-9dea-11ad5de62a40)\"" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p" podUID="72a6892f-5a69-434b-9dea-11ad5de62a40" Feb 19 03:11:44.843899 master-0 kubenswrapper[7776]: E0219 03:11:44.843840 7776 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"openshift-controller-manager-operator\" with CrashLoopBackOff: \"back-off 40s restarting failed container=openshift-controller-manager-operator pod=openshift-controller-manager-operator-584cc7bcb5-c7c8v_openshift-controller-manager-operator(05c9cb4a-5249-4116-a2e5-caa7859e2075)\"" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-584cc7bcb5-c7c8v" podUID="05c9cb4a-5249-4116-a2e5-caa7859e2075" Feb 19 03:11:44.907840 master-0 kubenswrapper[7776]: E0219 03:11:44.907639 7776 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Feb 19 03:11:44.907840 master-0 kubenswrapper[7776]: E0219 03:11:44.907736 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/33bb562f-84e7-4fcb-b008-416c09a5ecf0-cert podName:33bb562f-84e7-4fcb-b008-416c09a5ecf0 nodeName:}" failed. No retries permitted until 2026-02-19 03:11:52.907701457 +0000 UTC m=+419.247386015 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/33bb562f-84e7-4fcb-b008-416c09a5ecf0-cert") pod "cluster-autoscaler-operator-86b8dc6d6-pd8lj" (UID: "33bb562f-84e7-4fcb-b008-416c09a5ecf0") : secret "cluster-autoscaler-operator-cert" not found Feb 19 03:11:45.009390 master-0 kubenswrapper[7776]: E0219 03:11:45.009235 7776 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Feb 19 03:11:45.009628 master-0 kubenswrapper[7776]: E0219 03:11:45.009415 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/858a717b-a44e-4b8d-9974-7451a89cf104-cloud-credential-operator-serving-cert podName:858a717b-a44e-4b8d-9974-7451a89cf104 nodeName:}" failed. No retries permitted until 2026-02-19 03:11:53.009383854 +0000 UTC m=+419.349068402 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/858a717b-a44e-4b8d-9974-7451a89cf104-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-6968c58f46-p2hfn" (UID: "858a717b-a44e-4b8d-9974-7451a89cf104") : secret "cloud-credential-operator-serving-cert" not found Feb 19 03:11:45.009700 master-0 kubenswrapper[7776]: E0219 03:11:45.009603 7776 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Feb 19 03:11:45.009880 master-0 kubenswrapper[7776]: E0219 03:11:45.009477 7776 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Feb 19 03:11:45.009959 master-0 kubenswrapper[7776]: E0219 03:11:45.009841 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/59cea4cb-6374-49b6-97b3-d8a19cc1860f-samples-operator-tls podName:59cea4cb-6374-49b6-97b3-d8a19cc1860f nodeName:}" failed. No retries permitted until 2026-02-19 03:11:53.009773665 +0000 UTC m=+419.349458263 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/59cea4cb-6374-49b6-97b3-d8a19cc1860f-samples-operator-tls") pod "cluster-samples-operator-65c5c48b9b-hl874" (UID: "59cea4cb-6374-49b6-97b3-d8a19cc1860f") : secret "samples-operator-tls" not found Feb 19 03:11:45.010033 master-0 kubenswrapper[7776]: E0219 03:11:45.009974 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/afee48d5-7b45-42ef-acc8-e591ec479974-machine-approver-tls podName:afee48d5-7b45-42ef-acc8-e591ec479974 nodeName:}" failed. No retries permitted until 2026-02-19 03:11:53.00993533 +0000 UTC m=+419.349619888 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/afee48d5-7b45-42ef-acc8-e591ec479974-machine-approver-tls") pod "machine-approver-798b897698-hmpmj" (UID: "afee48d5-7b45-42ef-acc8-e591ec479974") : secret "machine-approver-tls" not found Feb 19 03:11:46.631229 master-0 kubenswrapper[7776]: E0219 03:11:46.630845 7776 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Feb 19 03:11:46.631229 master-0 kubenswrapper[7776]: E0219 03:11:46.630935 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls podName:255784ad-b52a-4c5c-ad15-278865ee2ccb nodeName:}" failed. No retries permitted until 2026-02-19 03:11:54.630917009 +0000 UTC m=+420.970601527 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls") pod "machine-api-operator-5c7cf458b4-prbs7" (UID: "255784ad-b52a-4c5c-ad15-278865ee2ccb") : secret "machine-api-operator-tls" not found Feb 19 03:11:52.912541 master-0 kubenswrapper[7776]: E0219 03:11:52.912036 7776 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Feb 19 03:11:52.912541 master-0 kubenswrapper[7776]: E0219 03:11:52.912167 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/33bb562f-84e7-4fcb-b008-416c09a5ecf0-cert podName:33bb562f-84e7-4fcb-b008-416c09a5ecf0 nodeName:}" failed. No retries permitted until 2026-02-19 03:12:08.912136649 +0000 UTC m=+435.251821197 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/33bb562f-84e7-4fcb-b008-416c09a5ecf0-cert") pod "cluster-autoscaler-operator-86b8dc6d6-pd8lj" (UID: "33bb562f-84e7-4fcb-b008-416c09a5ecf0") : secret "cluster-autoscaler-operator-cert" not found Feb 19 03:11:53.014222 master-0 kubenswrapper[7776]: E0219 03:11:53.013993 7776 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Feb 19 03:11:53.014222 master-0 kubenswrapper[7776]: E0219 03:11:53.014089 7776 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Feb 19 03:11:53.014222 master-0 kubenswrapper[7776]: E0219 03:11:53.014102 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/afee48d5-7b45-42ef-acc8-e591ec479974-machine-approver-tls podName:afee48d5-7b45-42ef-acc8-e591ec479974 nodeName:}" failed. No retries permitted until 2026-02-19 03:12:09.014071623 +0000 UTC m=+435.353756181 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/afee48d5-7b45-42ef-acc8-e591ec479974-machine-approver-tls") pod "machine-approver-798b897698-hmpmj" (UID: "afee48d5-7b45-42ef-acc8-e591ec479974") : secret "machine-approver-tls" not found Feb 19 03:11:53.014222 master-0 kubenswrapper[7776]: E0219 03:11:53.014194 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/59cea4cb-6374-49b6-97b3-d8a19cc1860f-samples-operator-tls podName:59cea4cb-6374-49b6-97b3-d8a19cc1860f nodeName:}" failed. No retries permitted until 2026-02-19 03:12:09.014170826 +0000 UTC m=+435.353855384 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/59cea4cb-6374-49b6-97b3-d8a19cc1860f-samples-operator-tls") pod "cluster-samples-operator-65c5c48b9b-hl874" (UID: "59cea4cb-6374-49b6-97b3-d8a19cc1860f") : secret "samples-operator-tls" not found Feb 19 03:11:53.014806 master-0 kubenswrapper[7776]: E0219 03:11:53.014639 7776 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Feb 19 03:11:53.014806 master-0 kubenswrapper[7776]: E0219 03:11:53.014764 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/858a717b-a44e-4b8d-9974-7451a89cf104-cloud-credential-operator-serving-cert podName:858a717b-a44e-4b8d-9974-7451a89cf104 nodeName:}" failed. No retries permitted until 2026-02-19 03:12:09.014731552 +0000 UTC m=+435.354416110 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/858a717b-a44e-4b8d-9974-7451a89cf104-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-6968c58f46-p2hfn" (UID: "858a717b-a44e-4b8d-9974-7451a89cf104") : secret "cloud-credential-operator-serving-cert" not found Feb 19 03:11:54.636066 master-0 kubenswrapper[7776]: E0219 03:11:54.635107 7776 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Feb 19 03:11:54.636066 master-0 kubenswrapper[7776]: E0219 03:11:54.635181 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls podName:255784ad-b52a-4c5c-ad15-278865ee2ccb nodeName:}" failed. No retries permitted until 2026-02-19 03:12:10.635162415 +0000 UTC m=+436.974846933 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls") pod "machine-api-operator-5c7cf458b4-prbs7" (UID: "255784ad-b52a-4c5c-ad15-278865ee2ccb") : secret "machine-api-operator-tls" not found Feb 19 03:11:55.356565 master-0 kubenswrapper[7776]: E0219 03:11:55.356494 7776 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-rbac-proxy\" with CrashLoopBackOff: \"back-off 20s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p_openshift-cloud-controller-manager-operator(72a6892f-5a69-434b-9dea-11ad5de62a40)\"" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p" podUID="72a6892f-5a69-434b-9dea-11ad5de62a40" Feb 19 03:12:06.843744 master-0 kubenswrapper[7776]: E0219 03:12:06.843049 7776 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-rbac-proxy\" with CrashLoopBackOff: \"back-off 20s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p_openshift-cloud-controller-manager-operator(72a6892f-5a69-434b-9dea-11ad5de62a40)\"" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p" podUID="72a6892f-5a69-434b-9dea-11ad5de62a40" Feb 19 03:12:08.928473 master-0 kubenswrapper[7776]: E0219 03:12:08.927742 7776 secret.go:189] Couldn't get secret openshift-machine-api/cluster-autoscaler-operator-cert: secret "cluster-autoscaler-operator-cert" not found Feb 19 03:12:08.928473 master-0 kubenswrapper[7776]: E0219 03:12:08.927839 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/33bb562f-84e7-4fcb-b008-416c09a5ecf0-cert podName:33bb562f-84e7-4fcb-b008-416c09a5ecf0 nodeName:}" failed. No retries permitted until 2026-02-19 03:12:40.927817492 +0000 UTC m=+467.267502020 (durationBeforeRetry 32s). Error: MountVolume.SetUp failed for volume "cert" (UniqueName: "kubernetes.io/secret/33bb562f-84e7-4fcb-b008-416c09a5ecf0-cert") pod "cluster-autoscaler-operator-86b8dc6d6-pd8lj" (UID: "33bb562f-84e7-4fcb-b008-416c09a5ecf0") : secret "cluster-autoscaler-operator-cert" not found Feb 19 03:12:09.029366 master-0 kubenswrapper[7776]: E0219 03:12:09.029069 7776 secret.go:189] Couldn't get secret openshift-cluster-machine-approver/machine-approver-tls: secret "machine-approver-tls" not found Feb 19 03:12:09.029366 master-0 kubenswrapper[7776]: E0219 03:12:09.029165 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/afee48d5-7b45-42ef-acc8-e591ec479974-machine-approver-tls podName:afee48d5-7b45-42ef-acc8-e591ec479974 nodeName:}" failed. No retries permitted until 2026-02-19 03:12:41.029138719 +0000 UTC m=+467.368823267 (durationBeforeRetry 32s). Error: MountVolume.SetUp failed for volume "machine-approver-tls" (UniqueName: "kubernetes.io/secret/afee48d5-7b45-42ef-acc8-e591ec479974-machine-approver-tls") pod "machine-approver-798b897698-hmpmj" (UID: "afee48d5-7b45-42ef-acc8-e591ec479974") : secret "machine-approver-tls" not found Feb 19 03:12:09.029366 master-0 kubenswrapper[7776]: E0219 03:12:09.029190 7776 secret.go:189] Couldn't get secret openshift-cluster-samples-operator/samples-operator-tls: secret "samples-operator-tls" not found Feb 19 03:12:09.029366 master-0 kubenswrapper[7776]: E0219 03:12:09.029323 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/59cea4cb-6374-49b6-97b3-d8a19cc1860f-samples-operator-tls podName:59cea4cb-6374-49b6-97b3-d8a19cc1860f nodeName:}" failed. No retries permitted until 2026-02-19 03:12:41.029247442 +0000 UTC m=+467.368932000 (durationBeforeRetry 32s). Error: MountVolume.SetUp failed for volume "samples-operator-tls" (UniqueName: "kubernetes.io/secret/59cea4cb-6374-49b6-97b3-d8a19cc1860f-samples-operator-tls") pod "cluster-samples-operator-65c5c48b9b-hl874" (UID: "59cea4cb-6374-49b6-97b3-d8a19cc1860f") : secret "samples-operator-tls" not found Feb 19 03:12:09.029820 master-0 kubenswrapper[7776]: E0219 03:12:09.029693 7776 secret.go:189] Couldn't get secret openshift-cloud-credential-operator/cloud-credential-operator-serving-cert: secret "cloud-credential-operator-serving-cert" not found Feb 19 03:12:09.029820 master-0 kubenswrapper[7776]: E0219 03:12:09.029766 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/858a717b-a44e-4b8d-9974-7451a89cf104-cloud-credential-operator-serving-cert podName:858a717b-a44e-4b8d-9974-7451a89cf104 nodeName:}" failed. No retries permitted until 2026-02-19 03:12:41.029745306 +0000 UTC m=+467.369429854 (durationBeforeRetry 32s). Error: MountVolume.SetUp failed for volume "cloud-credential-operator-serving-cert" (UniqueName: "kubernetes.io/secret/858a717b-a44e-4b8d-9974-7451a89cf104-cloud-credential-operator-serving-cert") pod "cloud-credential-operator-6968c58f46-p2hfn" (UID: "858a717b-a44e-4b8d-9974-7451a89cf104") : secret "cloud-credential-operator-serving-cert" not found Feb 19 03:12:10.651700 master-0 kubenswrapper[7776]: E0219 03:12:10.651349 7776 secret.go:189] Couldn't get secret openshift-machine-api/machine-api-operator-tls: secret "machine-api-operator-tls" not found Feb 19 03:12:10.651700 master-0 kubenswrapper[7776]: E0219 03:12:10.651426 7776 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls podName:255784ad-b52a-4c5c-ad15-278865ee2ccb nodeName:}" failed. No retries permitted until 2026-02-19 03:12:42.651402294 +0000 UTC m=+468.991086852 (durationBeforeRetry 32s). Error: MountVolume.SetUp failed for volume "machine-api-operator-tls" (UniqueName: "kubernetes.io/secret/255784ad-b52a-4c5c-ad15-278865ee2ccb-machine-api-operator-tls") pod "machine-api-operator-5c7cf458b4-prbs7" (UID: "255784ad-b52a-4c5c-ad15-278865ee2ccb") : secret "machine-api-operator-tls" not found Feb 19 03:12:19.552073 master-0 kubenswrapper[7776]: E0219 03:12:19.552038 7776 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-rbac-proxy\" with CrashLoopBackOff: \"back-off 40s restarting failed container=kube-rbac-proxy pod=cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p_openshift-cloud-controller-manager-operator(72a6892f-5a69-434b-9dea-11ad5de62a40)\"" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p" podUID="72a6892f-5a69-434b-9dea-11ad5de62a40"aggregated/ingress_controllers_certs.json0000640000000000000000000000045715145477636017555 0ustar0000000000000000[{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-02-19T03:05:26Z","not_after":"2028-02-19T03:05:27Z","controllers":[]},{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-02-19T03:05:25Z","not_after":"2028-02-19T03:05:26Z","controllers":[]}]events/openshift-cluster-version.json0000640000000000000000000002125715145477636016631 0ustar0000000000000000{"items":[{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T02:59:28Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-5cfd9759cf to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T02:59:31Z","reason":"LeaderElection","message":"master-0_b4b6c55b-dee4-401b-aced-163a632aa9d2 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T02:59:34Z","reason":"LeaderElection","message":"master-0_494132fb-befc-4be6-9ace-4d79e7afa8b6 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T02:59:36Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T02:59:36Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T02:59:38Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:00:09Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-5cfd9759cf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:03:30Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-5cfd9759cf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:03:32Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-5cfd9759cf-dsxxt","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:04:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:02Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:10Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:25Z","reason":"LeaderElection","message":"master-0_f98e15ee-03ba-4df6-9687-082e712fc53d became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\" in 14.261s (14.261s including waiting). Image size: 517888569 bytes.","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:25Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:27Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:27Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:28Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-57476485 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:40Z","reason":"ScalingReplicaSet","message":"Scaled down replica set cluster-version-operator-5cfd9759cf to 0 from 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:40Z","reason":"SuccessfulDelete","message":"Deleted pod: cluster-version-operator-5cfd9759cf-dsxxt","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:40Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-57476485-qjgq9","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:40Z","reason":"Killing","message":"Stopping container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:41Z","reason":"LeaderElection","message":"master-0_c7c505d7-1223-434f-8b4e-6c1e5dd27d24 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:43Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:43Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:05:45Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:11:15Z","reason":"LeaderElection","message":"master-0_c7c505d7-1223-434f-8b4e-6c1e5dd27d24 stopped leading","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:11:16Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:11:16Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:11:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:11:16Z","reason":"LeaderElection","message":"master-0_33afb77f-0db6-4407-aae9-d1af17528898 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:11:18Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:11:18Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-19T03:11:19Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\" architecture=\"amd64\"","type":"Normal"}]}config/pod/openshift-cluster-version/cluster-version-operator-57476485-qjgq9.json0000640000000000000000000001373015145477636026332 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-57476485-qjgq9","generateName":"cluster-version-operator-57476485-","namespace":"openshift-cluster-version","uid":"61abb34a-08f0-4438-9a89-c712b2048878","resourceVersion":"8182","creationTimestamp":"2026-02-19T03:05:40Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"57476485"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-57476485","uid":"1cd12eda-73b5-4ed3-98ff-d8d832d97957","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:41Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:40Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:17Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:17Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:40Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-19T03:05:40Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-02-19T03:11:16Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-19T03:05:41Z","finishedAt":"2026-02-19T03:11:15Z","containerID":"cri-o://0433548866cd3801c8b397fe3536ec33408d7af2a4a96c584b21e1d45a8f492e"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","containerID":"cri-o://e967e4bdcd17904293fe64ffaea6f290221329babeb23091aec673f02b8e7ca3","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415145477636011044 0ustar00000000000000001840203b-0a72-4f44-a65f-2466a8d525f1config/version.json0000640000000000000000000000526615145477636013120 0ustar0000000000000000{"metadata":{"name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","resourceVersion":"9129","generation":2,"creationTimestamp":"2026-02-19T02:59:15Z"},"spec":{"clusterID":"1840203b-0a72-4f44-a65f-2466a8d525f1","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.33","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","url":"https://access.redhat.com/errata/RHSA-2026:2078","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-02-19T02:59:38Z","completionTime":null,"version":"4.18.33","image":"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","verified":false}],"observedGeneration":2,"versionHash":"aMIRe2pH-Eo=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-02-19T02:59:38Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-02-19T02:59:38Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-02-19T02:59:38Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-02-19T02:59:38Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.33\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-02-19T02:59:38Z"},{"type":"Failing","status":"False","lastTransitionTime":"2026-02-19T03:11:19Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-19T02:59:38Z","message":"Working towards 4.18.33: 738 of 906 done (81% complete)"}],"availableUpdates":null}}aggregated/unused_machine_configs_count.json0000640000000000000000000000004115145477636020151 0ustar0000000000000000{"unused_machineconfigs_count":9}config/node/master-0.json0000640000000000000000000000551415145477636014004 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"31c9daf2-6e0b-415d-b71f-bd1b354f8d5d","resourceVersion":"9149","creationTimestamp":"2026-02-19T03:03:31Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330228Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179252Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-02-19T03:12:09Z","lastTransitionTime":"2026-02-19T03:03:31Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-02-19T03:12:09Z","lastTransitionTime":"2026-02-19T03:03:31Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-02-19T03:12:09Z","lastTransitionTime":"2026-02-19T03:03:31Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-02-19T03:12:09Z","lastTransitionTime":"2026-02-19T03:04:48Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.109.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202602022246-0","containerRuntimeVersion":"cri-o://1.31.13-6.rhaos4.18.git7ed6156.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/clusteroperator/storage.json0000640000000000000000000000346615145477636016334 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"5e5ec5bb-2de1-48e9-9acf-05714f4b30db","resourceVersion":"9040","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315145477636016700 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"0cbaa4e4-5725-4e07-9b48-9778ae11cb9b","resourceVersion":"4497","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:01Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:05:04Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:05:00Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000310115145477636024672 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"5d265a08-4bc2-47ad-8bf8-5bc4941b2a01","resourceVersion":"6789","generation":1,"creationTimestamp":"2026-02-19T02:59:39Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:39Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-19T03:05:39Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: NoOperatorGroup, message: csv in namespace with no operatorgroups"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:05:40Z","message":"Failed to deploy 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:40Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515145477636023476 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"732815bc-ca82-4092-b8be-cf0122ca1177","resourceVersion":"8138","generation":1,"creationTimestamp":"2026-02-19T02:59:39Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:39Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:10:29Z","message":"Deployed 4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:05:39Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:39Z"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115145477636022062 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"8792a23c-1907-42fb-85a2-3031dd484d0f","resourceVersion":"6654","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:05:39Z","message":"Deployed 4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:05:39Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:39Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:39Z"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601302238.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315145477636020324 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"eb0fba4c-8b9d-47ea-952e-27d93fdcd9f1","resourceVersion":"777","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000430415145477636022450 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"efeca314-0377-42a2-aae3-2d3ca32b93ca","resourceVersion":"7189","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:04:59Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-19T03:05:02Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-19T03:05:02Z","reason":"_NoPodsAvailable","message":"Available: no pods available on any node."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:04:59Z","reason":"NoData"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215145477636020656 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"5ceafc09-1707-4f8e-b073-8b032d19e714","resourceVersion":"7713","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:08Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:05:48Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-19T03:05:10Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.39:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.39:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:08Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:05:08Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"openshift-apiserver","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001455515145477636015460 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"4d79608b-0025-440a-9c20-daca62c58989","resourceVersion":"7703","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:31Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-19T03:05:40Z","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying","message":"CatalogdDeploymentCatalogdControllerManagerProgressing: Waiting for Deployment to deploy pods"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-19T03:05:40Z","reason":"CatalogdDeploymentCatalogdControllerManager_Deploying","message":"CatalogdDeploymentCatalogdControllerManagerAvailable: Waiting for Deployment"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:31Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:05:30Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115145477636017106 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"59dfa993-e0f1-4ed9-8e53-baee46e5a371","resourceVersion":"6149","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:05:26Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.33\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:05:28Z","reason":"AsExpected","message":"Cluster version is \"4.18.33\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:25Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.33"},{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614315145477636016357 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"01427d56-6c6c-4f55-be3a-d759ce44c22c","resourceVersion":"6775","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-02-19T03:03:51Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:03:40Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:03:40Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:05:39Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:04:56Z"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715145477636017052 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"36f2429d-5926-421d-ba43-8a0cf1de62f1","resourceVersion":"6590","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-02-19T03:05:38Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-02-19T03:05:38Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-19T03:05:38Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:38Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315145477636017147 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"b915df2e-e1f2-48ba-94bd-c8fb5b5491ab","resourceVersion":"6701","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:05:39Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.33"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:05:39Z","reason":"OperatorAvailable","message":"Available release version: 4.18.33"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:39Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:39Z","reason":"OperatorAvailable","message":"Available release version: 4.18.33"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015145477636017521 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"c837b55d-8c3e-443c-963d-4abe92fc4b44","resourceVersion":"815","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000146715145477636020127 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"e4f26df2-aa2b-4466-9b02-d67d3c8ea0f5","resourceVersion":"782","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000263415145477636017037 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"96ed7464-2cd3-49f3-b802-645816af818f","resourceVersion":"804","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","name":""},{"group":"machine.openshift.io","resource":"machinesets","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddresses","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddressclaims","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000351415145477636022557 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"8edd6014-cbb6-4479-8d66-dd24a461feef","resourceVersion":"8054","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:09Z","reason":"AsExpected","message":"KubeStorageVersionMigratorDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps migrator)"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:05:26Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:05:26Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:09Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:05:09Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615145477636017567 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"f02f96f7-492f-41b8-a7e2-f3d038dcf099","resourceVersion":"7500","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:04:59Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-19T03:05:16Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-19T03:05:01Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:04:59Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:04:59Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715145477636021410 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"19d59dfc-0928-4e53-a295-b8b40f4164f4","resourceVersion":"7630","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:00Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-19T03:05:35Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-19T03:05:01Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:01Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:05:00Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715145477636017615 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"76c3249d-1dcc-4ff6-b6ed-f443a514212f","resourceVersion":"7398","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:04:51Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-19T03:05:45Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-19T03:04:52Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:04:51Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-19T03:04:51Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000534015145477636016511 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"b7398fa4-f589-4eb3-a4f1-0aa7ac0cdd32","resourceVersion":"9207","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:12:30Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"Unknown","lastTransitionTime":"2026-02-19T03:12:30Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:12:30Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-19T03:12:30Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:12:30Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-02-19T03:12:30Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-02-19T03:12:30Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"Unknown","lastTransitionTime":"2026-02-19T03:12:30Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:12:30Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}config/clusteroperator/ingress.json0000640000000000000000000000456715145477636016345 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"14bb0c8b-42d1-4625-9fec-21d9dd4a0044","resourceVersion":"6064","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:05:27Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-19T03:05:26Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:27Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:26Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-19T03:05:26Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715145477636017612 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"1956665f-c732-4fb3-8fb5-ea6a044b47b2","resourceVersion":"697","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015145477636015604 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"31a4b82d-34c3-4a0b-b2e8-2ac481a01681","resourceVersion":"5507","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:04:59Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nEtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-19T03:05:21Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-19T03:04:59Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:04:59Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:04:59Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515145477636015454 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"bffe5d66-1708-4262-85c9-919cd420f464","resourceVersion":"8761","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:11:37Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:11:37Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:11:37Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:25Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000431215145477636021453 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"3a1648ba-31dd-4d6c-91fb-e2acd3bc5ebe","resourceVersion":"8039","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:14Z","reason":"AsExpected","message":"WebhookRemovalControllerDegraded: Timeout: request did not complete within requested timeout - context deadline exceeded\nCSISnapshotStaticResourceControllerDegraded: \"serviceaccount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts csi-snapshot-controller)\nCSISnapshotStaticResourceControllerDegraded: \nCSISnapshotControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps csi-snapshot-controller)"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:05:29Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:05:29Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:14Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:05:14Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"csi-snapshot-controller","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515145477636021635 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"386306a5-c072-474f-ad4c-c42b76b80542","resourceVersion":"8167","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:11:15Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:11:15Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:11:15Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:11:15Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215145477636016316 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"781997eb-3b24-4ac4-8bfa-9b77b7cfafe5","resourceVersion":"733","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615145477636017756 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"d40fd550-1172-41bd-9a35-f534b2331469","resourceVersion":"4335","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:05:02Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.33"},{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000164415145477636020505 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"e44ec7ca-8011-4bf1-bac8-3ebc94a7e82f","resourceVersion":"830","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","name":""},{"group":"autoscaling.openshift.io","resource":"machineautoscalers","name":""}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000000346515145477636020105 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"3e272b48-224f-4354-9699-81048c7045b1","resourceVersion":"786","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"pod-identity-webhook"},{"group":"apps","resource":"deployments","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","name":""},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"","resource":"serviceaccounts","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"","resource":"services","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"pod-identity-webhook"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440115145477636021555 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"254f724d-f767-461e-b4da-5360db191600","resourceVersion":"9006","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.33"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:11:42Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015145477636016616 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"d06d0a41-eafc-4fdb-b994-e636d091cdfa","resourceVersion":"8976","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:11:41Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:11:41Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:11:41Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:11:41Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-19T03:11:41Z"}],"versions":[{"name":"operator","version":"4.18.33"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000001037115145477636017700 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"7aa81775-63ec-4c69-92e8-b37079c36127","resourceVersion":"8043","generation":1,"creationTimestamp":"2026-02-19T02:59:38Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-19T03:09:55Z","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError::SystemServiceCAConfig_Error","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nSystemServiceCAConfigDegraded: Unable to get or create system service CA config \"v4-0-config-system-service-ca\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps v4-0-config-system-service-ca)"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-19T03:05:55Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-19T03:05:14Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.150.168:443/healthz\": dial tcp 172.30.150.168:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-19T03:05:13Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-19T03:05:13Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.33"},{"name":"oauth-apiserver","version":"4.18.33"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/running_containers.json0000640000000000000000000000751015145477636015332 0ustar0000000000000000{"images":{"0":"sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","1":"sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","10":"sha256:ce68078d909b63bb5b872d94c04829aa1b5812c416abbaf9024840d348ee68b1","11":"sha256:7eef7d0364bb9259fdc66e57df6df3a59ce7bf957a77d0ca25d4fedb5f122015","12":"sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd","13":"sha256:8fd63e2c1185e529c6e9f6e1426222ff2ac195132b44a1775f407e4593b66d4c","14":"sha256:40bb7cf7c637bf9efd8fb0157839d325a019d67cc7d7279665fcf90dbb7f3f33","15":"sha256:f86073cf0561e4b69668f8917ef5184cb0ef5aa16d0fefe38118f1167b268721","16":"sha256:457c564075e8b14b1d24ff6eab750600ebc90ff8b7bb137306a579ee8445ae95","17":"sha256:034588ffd95ce834e866279bf80a45af2cddda631c6c9a6344c1bb2e033fd83e","18":"sha256:235b846666adaa2e4b4d6d0f7fd71d57bf3be253466e1d9fffafd103fa2696ac","19":"sha256:4797a485fd4ab3414ba8d52bdf2afccefab6c657b1d259baad703fca5145124c","2":"sha256:7b9239f1f5e9590e3db71e61fde86db8f43e0085f61ae7769508d2ea058481c7","20":"sha256:ebf883de8fd905490f0c9b420a5d6446ecde18e12e15364f6dcd4e885104972c","21":"registry.redhat.io/redhat/redhat-operator-index:v4.18","22":"sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","23":"sha256:ce471c00b59fd855a59f7efa9afdb3f0f9cbf1c4bcce3a82fe1a4cb82e90f52e","24":"sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de","25":"sha256:897708222502e4d710dd737923f74d153c084ba6048bffceb16dfd30f79a6ecc","26":"sha256:6acc7c3c018d8bb3cb597580eedae0300c44a5424f07129270c878899ef592a6","27":"sha256:117a846734fc8159b7172a40ed2feb43a969b7dbc113ee1a572cbf6f9f922655","28":"sha256:7a132d09565133b36ac7c797213d6a74ac810bb368ef59136320ab3d300f45bd","29":"sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec","3":"sha256:d77a77c401bcfaa65a6ab6de82415af0e7ace1b470626647e5feb4875c89a5ef","30":"registry.redhat.io/redhat/community-operator-index:v4.18","31":"sha256:b1d840665bf310fa455ddaff9b262dd0649440ca9ecf34d49b340ce669885568","32":"sha256:fc46bdc145c2a9e4a89a5fe574cd228b7355eb99754255bf9a0c8bf2cc1de1f2","33":"sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74","34":"sha256:ce89154fa3fe1e87c660e644b58cf125fede575869fd5841600082c0d1f858a3","35":"sha256:f42321072d0ab781f41e8f595ed6f5efabe791e472c7d0784e61b3c214194656","36":"sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf","37":"sha256:2c8de5c5b21ed8c7829ba988d580ffa470c9913877fe0ee5e11bf507400ffbc7","38":"sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","39":"sha256:4775c6461221dafe3ddd67ff683ccb665bed6eb278fa047d9d744aab9af65dcf","4":"sha256:6c7ec917f0eff7b41d7174f1b5fdc4ce53ad106e51599afba731a8431ff9caa7","40":"registry.redhat.io/redhat/certified-operator-index:v4.18","41":"sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e","42":"sha256:16ea15164e7d71550d4c0e2c90d17f96edda4ab77123947b2e188ffb23951fa0","43":"sha256:4e8c6ae1f9a450c90857c9fbccf1e5fb404dbc0d65d086afce005d6bd307853b","44":"sha256:a1b426a276216372c7d688fe60e9eaf251efd35071f94e1bcd4337f51a90fd75","45":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","5":"sha256:8177c465e14c63854e5c0fa95ca0635cffc9b5dd3d077ecf971feedbc42b1274","6":"sha256:3e089c4e4fa9a22803b2673b776215e021a1f12a856dbcaba2fadee29bee10a3","7":"sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9","8":"sha256:11f566fe2ae782ad96d36028b0fd81911a64ef787dcebc83803f741f272fa396","9":"sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021"},"containers":{"2026-02":{"0":9,"1":8,"10":2,"11":2,"12":2,"13":2,"14":1,"15":1,"16":1,"17":1,"18":1,"19":1,"2":6,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"5":4,"6":2,"7":2,"8":2,"9":2}}}config/pod/openshift-service-ca/service-ca-576b4d78bd-92gqk.json0000640000000000000000000001552415145477636022603 0ustar0000000000000000{"metadata":{"name":"service-ca-576b4d78bd-92gqk","generateName":"service-ca-576b4d78bd-","namespace":"openshift-service-ca","uid":"18b29e37-cda9-41a8-a910-3d8f74be3cf3","resourceVersion":"8581","creationTimestamp":"2026-02-19T03:05:02Z","labels":{"app":"service-ca","pod-template-hash":"576b4d78bd","service-ca":"true"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.29/23\"],\"mac_address\":\"0a:58:0a:80:00:1d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.29/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.29\"\n ],\n \"mac\": \"0a:58:0a:80:00:1d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"service-ca-576b4d78bd","uid":"1810525c-dea7-499e-b842-e0d2979608d6","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"signing-key","secret":{"secretName":"signing-key","defaultMode":420}},{"name":"signing-cabundle","configMap":{"name":"signing-cabundle","defaultMode":420}},{"name":"kube-api-access-bkfcl","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"service-ca-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","command":["service-ca-operator","controller"],"args":["-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"120Mi"}},"volumeMounts":[{"name":"signing-key","mountPath":"/var/run/secrets/signing-key"},{"name":"signing-cabundle","mountPath":"/var/run/configmaps/signing-cabundle"},{"name":"kube-api-access-bkfcl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000580000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"service-ca","serviceAccount":"service-ca","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c24,c14"},"fsGroup":1000580000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:04Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:02Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:24Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:24Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:02Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.29","podIPs":[{"ip":"10.128.0.29"}],"startTime":"2026-02-19T03:05:02Z","containerStatuses":[{"name":"service-ca-controller","state":{"running":{"startedAt":"2026-02-19T03:11:23Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0219 03:10:38.907764 1 cmd.go:257] Using insecure, self-signed certificates\nI0219 03:10:38.908424 1 crypto.go:601] Generating new CA for service-ca-controller-signer@1771470638 cert, and key in /tmp/serving-cert-3529850204/serving-signer.crt, /tmp/serving-cert-3529850204/serving-signer.key\nI0219 03:10:39.068457 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0219 03:10:39.068792 1 observer_polling.go:159] Starting file observer\nI0219 03:10:39.069222 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0219 03:10:39.069248 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0219 03:10:39.095363 1 builder.go:304] service-ca-controller version -\nI0219 03:10:39.096745 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/tmp/serving-cert-3529850204/tls.crt::/tmp/serving-cert-3529850204/tls.key\"\nF0219 03:11:09.343955 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-service-ca/leases/service-ca-controller-lock\": context deadline exceeded\n","startedAt":"2026-02-19T03:10:38Z","finishedAt":"2026-02-19T03:11:09Z","containerID":"cri-o://9e9d3d42da46d1a6d18e0de03a09b726c32bb354f1e9ff23661a98024aebe2a1"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","containerID":"cri-o://b38f9732c5ad0fdaf85a5b0eeace05d1423b42a0f4f33da5f05d90978e47d8c3","started":true,"volumeMounts":[{"name":"signing-key","mountPath":"/var/run/secrets/signing-key"},{"name":"signing-cabundle","mountPath":"/var/run/configmaps/signing-cabundle"},{"name":"kube-api-access-bkfcl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-service-ca-operator/service-ca-operator-c48c8bf7c-f7fvc.json0000640000000000000000000001554515145477636026341 0ustar0000000000000000{"metadata":{"name":"service-ca-operator-c48c8bf7c-f7fvc","generateName":"service-ca-operator-c48c8bf7c-","namespace":"openshift-service-ca-operator","uid":"3edc7410-417a-4e55-9276-ac271fd52297","resourceVersion":"8607","creationTimestamp":"2026-02-19T03:03:32Z","labels":{"app":"service-ca-operator","pod-template-hash":"c48c8bf7c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"service-ca-operator-c48c8bf7c","uid":"ce62cdf0-f5ae-4b24-a58f-4da648f4b86e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"service-ca-operator-config","defaultMode":420}},{"name":"kube-api-access-vzpth","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"service-ca-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","command":["service-ca-operator","operator"],"args":["--config=/var/run/configmaps/config/operator-config.yaml","-v=2"],"env":[{"name":"CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"}],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-vzpth","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"service-ca-operator","serviceAccount":"service-ca-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c7"},"runAsUser":1001,"runAsGroup":1001,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:31Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:31Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-02-19T03:04:48Z","containerStatuses":[{"name":"service-ca-operator","state":{"running":{"startedAt":"2026-02-19T03:11:31Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0219 03:09:52.248082 1 cmd.go:253] Using service-serving-cert provided certificates\nI0219 03:09:52.248268 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0219 03:09:52.248751 1 observer_polling.go:159] Starting file observer\nI0219 03:09:52.249219 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0219 03:09:52.249243 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0219 03:10:35.933852 1 builder.go:304] service-ca-operator version -\nI0219 03:10:35.934740 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0219 03:11:06.590910 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-service-ca-operator/leases/service-ca-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-19T03:09:52Z","finishedAt":"2026-02-19T03:11:06Z","containerID":"cri-o://40f21b66295146208ac6883b550126dd464dc59801ea5eec8001be9ddf550599"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a82e441a9e9b93f0e010f1ce26e30c24b6ca93f7752084d4694ebdb3c5b53f83","containerID":"cri-o://6a5db57d3cdfa9709ab008271a7de8b76cb4f5beeb18f426e1c635fff0d68431","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-vzpth","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-7d7db75979-jbztp.json0000640000000000000000000002265715145477636025542 0ustar0000000000000000{"metadata":{"name":"network-operator-7d7db75979-jbztp","generateName":"network-operator-7d7db75979-","namespace":"openshift-network-operator","uid":"c791d8d0-6d78-4cdc-bac2-aa39bd3aae21","resourceVersion":"8593","creationTimestamp":"2026-02-19T03:03:32Z","labels":{"name":"network-operator","pod-template-hash":"7d7db75979"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7d7db75979","uid":"dbe80527-af21-4c58-8c98-0aebd1c18ecc","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-gbffz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a35674598116548a5ce2f581acac033b76f22fa1b8522cc81b90e27feda33ed3"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d7a8ac0ba2e5115c9d451d553741173ae8744d4544da15e28bf38f61630182fd"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:24097d3bc90ed1fc543f5d96736c6091eb57b9e578d7186f430147ee28269cbf"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3c467c1eeba7434b2aebf07169ab8afe0203d638e871dbdf29a16f830e9aef9e"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b1d840665bf310fa455ddaff9b262dd0649440ca9ecf34d49b340ce669885568"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72fafcd55ab739919dd8a114863fda27106af1c497f474e7ce0cb23b58dfa021"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:16ea15164e7d71550d4c0e2c90d17f96edda4ab77123947b2e188ffb23951fa0"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4152cebea96e2b9a15cdc77a9c318b7af0db9ea1352619dac282e167e6e0d71b"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bc0ca626e5e17f9f78ddbfde54ea13ddc7749904911817bba16e6b59f30499ec"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e53cc6c4d6263c99978c787e90575dd4818eac732589145ca7331186ad4f16de"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6fcab14d8cbcfb642ae6cc0d581cb152e45f39cf75c303ba7760fd448dfa2b2b"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1582ea693f35073e3316e2380a18227b78096ca7f4e1328f1dd8a2c423da26e9"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0db75a631b1a51f2e6aa1cbf62770f4bd7604965ab1ddaddb07d18eb324d0acf"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dbffd1dbbfea8326edd5142aaed93290359c152c805239f2ffc77a21b6648490"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gbffz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:03:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:03:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:30Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:30Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:03:32Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-19T03:03:34Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-02-19T03:11:30Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0219 03:09:52.503024 1 cmd.go:250] Using service-serving-cert provided certificates\nI0219 03:09:52.503232 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0219 03:09:52.504844 1 observer_polling.go:159] Starting file observer\nI0219 03:10:35.933531 1 builder.go:298] network-operator version 4.18.0-202601302238.p2.gf63a7ff.assembly.stream.el9-f63a7ff-f63a7ffb316c9ca4359210ff5ea2c003dbe2d6a9\nF0219 03:11:06.549576 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-operator/leases/network-operator-lock\": context deadline exceeded\n","startedAt":"2026-02-19T03:09:52Z","finishedAt":"2026-02-19T03:11:06Z","containerID":"cri-o://86f20f93c3f50a3529fa79e0b6468f791d85c5c63dd623a77eb62ec52b0785bc"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a31b448302fbb994548ed801ac488a44e8a7c4ae9149c3b4cc20d6af832f83","containerID":"cri-o://80fae86b6444b832936906f4af236b682b20d4c74b011ed1a2ad10c745c8d2a1","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-gbffz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-rm5jg.json0000640000000000000000000002463215145477636025740 0ustar0000000000000000{"metadata":{"name":"network-node-identity-rm5jg","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"a52be87c-e707-4269-96da-537708d52b64","resourceVersion":"7761","creationTimestamp":"2026-02-19T03:04:09Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"5978f5f76","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"27a0be62-fbff-4e67-b59f-c81e7eea07fb","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-kv24m","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-kv24m","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-kv24m","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:27Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:09Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:09:51Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:09:51Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:09Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-19T03:04:09Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-02-19T03:07:01Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"sr-nh7dg\"} reason=\"CSRApproved\"\nI0219 03:04:30.668893 1 approver.go:230] Finished syncing CSR csr-nh7dg for master-0 node in 6.017962ms\nI0219 03:04:30.669026 1 approver.go:230] Finished syncing CSR csr-nh7dg for unknown node in 65.082µs\nI0219 03:04:30.676752 1 approver.go:230] Finished syncing CSR csr-nh7dg for unknown node in 41.741µs\nI0219 03:04:47.816417 1 recorder.go:104] \"CSR \\\"csr-pmfn2\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-pmfn2\"} reason=\"CSRApproved\"\nI0219 03:04:47.824648 1 approver.go:230] Finished syncing CSR csr-pmfn2 for master-0 node in 8.5955ms\nI0219 03:04:47.824844 1 approver.go:230] Finished syncing CSR csr-pmfn2 for unknown node in 98.983µs\nI0219 03:04:47.835069 1 approver.go:230] Finished syncing CSR csr-pmfn2 for unknown node in 122.604µs\nE0219 03:06:21.888039 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0219 03:06:36.887181 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0219 03:06:36.887227 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0219 03:06:51.888616 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0219 03:06:51.888810 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-02-19T03:04:26Z","finishedAt":"2026-02-19T03:06:51Z","containerID":"cri-o://f6706a38252937f6734b664a0f078763a45b428cf03e52f78ca141868385452d"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","containerID":"cri-o://246e246788c76f41235c1898d383b771146f06c3b5bc939889392a3b403a8a89","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-kv24m","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-02-19T03:04:26Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:94d88fe2fa42931a725508dbf17296b6ed99b8e20c1169f5d1fb8a36f4927ddd","containerID":"cri-o://110ad15e5221ce48ace3075a78e0e079f95d63430bd06e9e3cc32be3b1b49b73","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-kv24m","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001513615145477636026301 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"61dea86c-eb66-4222-a99f-72883bf8a222","resourceVersion":"3761","creationTimestamp":"2026-02-19T03:03:46Z","annotations":{"kubernetes.io/config.hash":"c997c8e9d3be51d454d8e61e376bef08","kubernetes.io/config.mirror":"c997c8e9d3be51d454d8e61e376bef08","kubernetes.io/config.seen":"2026-02-19T03:02:57.077643523Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"31c9daf2-6e0b-415d-b71f-bd1b354f8d5d","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-19T03:04:54Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-19T03:03:01Z","finishedAt":"2026-02-19T03:03:02Z","containerID":"cri-o://057cad626bcfaec41c462ca1ec27ee5d9cbc1905800d5d8b5f0df0e891b48ec8"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://057cad626bcfaec41c462ca1ec27ee5d9cbc1905800d5d8b5f0df0e891b48ec8","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-02-19T03:03:46Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0219 03:03:21.465200 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0219 03:03:21.465443 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0219 03:03:21.467399 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-02-19T03:03:21Z","finishedAt":"2026-02-19T03:03:21Z","containerID":"cri-o://53d32d6e913448c501ea08b87db55bb0233a108aad73fab0d0903446a3305ceb"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://5063a55beab9e17c44bf467460af64eb399204406812c9ae4e396f59fae30a15","started":true}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-6569778c84-qcd49.json0000640000000000000000000002431415145477636025131 0ustar0000000000000000{"metadata":{"name":"ingress-operator-6569778c84-qcd49","generateName":"ingress-operator-6569778c84-","namespace":"openshift-ingress-operator","uid":"9ff96ce8-6427-4a42-afa6-8b8bc778f094","resourceVersion":"7771","creationTimestamp":"2026-02-19T03:03:31Z","labels":{"name":"ingress-operator","pod-template-hash":"6569778c84"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.5/23\"],\"mac_address\":\"0a:58:0a:80:00:05\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.5/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.5\"\n ],\n \"mac\": \"0a:58:0a:80:00:05\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-6569778c84","uid":"e2412bca-045c-4e59-9c2e-f43e7f3e5ce8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-cpdqx","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb94366d6d4423592369eeca84f0fe98325db13d0ab9e0291db9f1a337cd7143"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-cpdqx","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-cpdqx","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:26Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:10:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:10:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.5","podIPs":[{"ip":"10.128.0.5"}],"startTime":"2026-02-19T03:04:48Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-02-19T03:09:52Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"er-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Proxy ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0219 03:07:26.048449 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DaemonSet ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-02-19T03:07:26.048Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\nW0219 03:07:26.048617 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Role ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0219 03:07:26.048650 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DNSRecord ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-02-19T03:07:26.048Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-02-19T03:07:26.048Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\nW0219 03:07:26.048784 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.RoleBinding ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-02-19T03:07:26.053Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n2026-02-19T03:07:26.053Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2026-02-19T03:05:25Z","finishedAt":"2026-02-19T03:07:26Z","containerID":"cri-o://48896fb51d13a46ede8e9679a55d5198adfa5eeb4a91ae305507c9b4bf39a65b"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5f4a546983224e416dfcc3a700afc15f9790182a5a2f8f7c94892d0e95abab3","containerID":"cri-o://4a1578bce100ddf52237ceaea2572cac0b7ea648901d8dde9625de51a4236ef1","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-cpdqx","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-19T03:05:25Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://a224ce5061b47ffc9528e375f91b4111ff8e66e3009eb1eba7e9319a13736164","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-cpdqx","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-config-operator/openshift-config-operator-6f47d587d6-zn8c7.json0000640000000000000000000002154115145477636026672 0ustar0000000000000000{"metadata":{"name":"openshift-config-operator-6f47d587d6-zn8c7","generateName":"openshift-config-operator-6f47d587d6-","namespace":"openshift-config-operator","uid":"78d3ac03-8ba0-40d3-9fc5-cc21f7b4efda","resourceVersion":"8185","creationTimestamp":"2026-02-19T03:03:33Z","labels":{"app":"openshift-config-operator","pod-template-hash":"6f47d587d6"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.19/23\"],\"mac_address\":\"0a:58:0a:80:00:13\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.19/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.19\"\n ],\n \"mac\": \"0a:58:0a:80:00:13\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-config-operator-6f47d587d6","uid":"88366d29-5e52-4cc1-89ab-260228ed97cf","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"config-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"available-featuregates","emptyDir":{"sizeLimit":"100Mi"}},{"name":"kube-api-access-rn9d8","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"openshift-api","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86ce6c3977c663ad9ad9a5d627bb08727af38fd3153a0a463a10b534030ee126","command":["write-available-featuresets","--asset-output-dir=/available-featuregates","--payload-version=$(OPERATOR_IMAGE_VERSION)"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-rn9d8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"containers":[{"name":"openshift-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c","command":["cluster-config-operator","operator","--operator-version=$(OPERATOR_IMAGE_VERSION)","--authoritative-feature-gate-dir=/available-featuregates"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.33"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.33"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-rn9d8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-config-operator","serviceAccount":"openshift-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c7"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:58Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:17Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:17Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.19","podIPs":[{"ip":"10.128.0.19"}],"startTime":"2026-02-19T03:04:48Z","initContainerStatuses":[{"name":"openshift-api","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-19T03:04:58Z","finishedAt":"2026-02-19T03:04:58Z","containerID":"cri-o://c20b9e1e7e9550aa5bfbad939d9f66144cfef2538d416de2194bb171ea06814d"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86ce6c3977c663ad9ad9a5d627bb08727af38fd3153a0a463a10b534030ee126","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86ce6c3977c663ad9ad9a5d627bb08727af38fd3153a0a463a10b534030ee126","containerID":"cri-o://c20b9e1e7e9550aa5bfbad939d9f66144cfef2538d416de2194bb171ea06814d","started":false,"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-rn9d8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"openshift-config-operator","state":{"running":{"startedAt":"2026-02-19T03:11:13Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0219 03:11:01.094765 1 cmd.go:250] Using service-serving-cert provided certificates\nI0219 03:11:01.094934 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0219 03:11:01.095273 1 observer_polling.go:159] Starting file observer\nI0219 03:11:01.111725 1 builder.go:298] config-operator version 4.18.0-202601302238.p2.g85cb407.assembly.stream.el9-85cb407-85cb40728227fac13a2983fb6e3170d67cf62075\nI0219 03:11:12.897898 1 cmd.go:138] Received SIGTERM or SIGINT signal, shutting down controller.\nF0219 03:11:12.898093 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-config-operator/leases/config-operator-lock\": context canceled\n","startedAt":"2026-02-19T03:11:01Z","finishedAt":"2026-02-19T03:11:12Z","containerID":"cri-o://4dafdbf16e4e12628e1dc265ab0c8607f980c06cb5f19358b6fbca76bb67b579"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86d9e1fdf97794f44fc1c91da025714ec6900fafa6cdc4c0041ffa95e9d70c6c","containerID":"cri-o://2a9ccd68c71b55517a0af025c793f340d5a13b8dd01aa9526d809fbaf1a82b89","started":true,"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-rn9d8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-6847bb4785-6trsd.json0000640000000000000000000001402015145477636030250 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-6847bb4785-6trsd","generateName":"csi-snapshot-controller-6847bb4785-","namespace":"openshift-cluster-storage-operator","uid":"c8f325fb-0075-4a18-ba7e-669ab19bc91a","resourceVersion":"8030","creationTimestamp":"2026-02-19T03:05:14Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"6847bb4785"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.32/23\"],\"mac_address\":\"0a:58:0a:80:00:20\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.32/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.32\"\n ],\n \"mac\": \"0a:58:0a:80:00:20\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-6847bb4785","uid":"20c867cd-ad83-4a6d-91ad-8df918c4deb4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-jxvxh","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-jxvxh","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000150000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsNonRoot":true,"fsGroup":1000150000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:14Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:10:43Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:10:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:14Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.32","podIPs":[{"ip":"10.128.0.32"}],"startTime":"2026-02-19T03:05:14Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-02-19T03:10:42Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"I0219 03:09:52.331061 1 feature_gate.go:387] feature gates: {map[]}\nI0219 03:09:52.331283 1 main.go:169] Version: 661796e08c9cbbd782e43b2bd7211df9518c59dc\nI0219 03:09:52.332708 1 main.go:220] Start NewCSISnapshotController with kubeconfig [] resyncPeriod [15m0s]\nE0219 03:10:22.333216 1 main.go:98] Failed to list v1 volumesnapshots with error=Get \"https://172.30.0.1:443/apis/snapshot.storage.k8s.io/v1/volumesnapshots?limit=1\": context deadline exceeded\nE0219 03:10:22.333327 1 main.go:246] Exiting due to failure to ensure CRDs exist during startup: context deadline exceeded\n","startedAt":"2026-02-19T03:09:52Z","finishedAt":"2026-02-19T03:10:22Z","containerID":"cri-o://06265a4a0b6f3c8a8128f95451a5945a8bbe001ae9ab38435a2630dfd4fd6aa3"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:39d04e6e7ced98e7e189aff1bf392a4d4526e011fc6adead5c6b27dbd08776a9","containerID":"cri-o://6f78f5411f8025c775c1717b601fd356801be5421b8cffa32ecda2678d51b4c5","started":true,"volumeMounts":[{"name":"kube-api-access-jxvxh","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-bcf775fc9-dcpwb.json0000640000000000000000000002055315145477636032176 0ustar0000000000000000{"metadata":{"name":"cluster-node-tuning-operator-bcf775fc9-dcpwb","generateName":"cluster-node-tuning-operator-bcf775fc9-","namespace":"openshift-cluster-node-tuning-operator","uid":"2acaff2d-b9d0-4ed5-9de3-48029eaa8ce5","resourceVersion":"8085","creationTimestamp":"2026-02-19T03:03:32Z","labels":{"name":"cluster-node-tuning-operator","pod-template-hash":"bcf775fc9"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-node-tuning-operator-bcf775fc9","uid":"700216c3-01ee-44e0-bbb1-f1c7dbbc5872","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"node-tuning-operator-tls","secret":{"secretName":"node-tuning-operator-tls","defaultMode":420}},{"name":"apiservice-cert","secret":{"secretName":"performance-addon-operator-webhook-cert","items":[{"key":"tls.crt","path":"apiserver.crt"},{"key":"tls.key","path":"apiserver.key"}],"defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"kube-api-access-vdxnk","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-node-tuning-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","command":["cluster-node-tuning-operator"],"args":["-v=0"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"RESYNC_PERIOD","value":"600"},{"name":"CLUSTER_NODE_TUNED_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-vdxnk","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"readOnlyRootFilesystem":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-node-tuning-operator","serviceAccount":"cluster-node-tuning-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c0"},"runAsUser":499,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:05:26Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:00Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:00Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:04:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-02-19T03:04:48Z","containerStatuses":[{"name":"cluster-node-tuning-operator","state":{"running":{"startedAt":"2026-02-19T03:11:00Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ler\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\"}\nI0219 03:05:25.443959 1 controller.go:1443] started events processor/controller\nI0219 03:05:25.462756 1 server.go:104] starting metrics server\nI0219 03:05:25.484077 1 controller.go:653] created profile master-0 [openshift-control-plane]\n{\"level\":\"info\",\"ts\":\"2026-02-19T03:05:25Z\",\"msg\":\"Starting workers\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\",\"worker count\":1}\nE0219 03:06:59.361667 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0219 03:07:59.364456 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io node-tuning-operator-lock)\nE0219 03:09:33.369459 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0219 03:10:25.356370 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-cluster-node-tuning-operator/leases/node-tuning-operator-lock\": context deadline exceeded\nI0219 03:10:25.356424 1 leaderelection.go:297] failed to renew lease openshift-cluster-node-tuning-operator/node-tuning-operator-lock: timed out waiting for the condition\nE0219 03:10:59.360076 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF0219 03:10:59.360144 1 main.go:242] manager exited with non-zero code: leader election lost\n","startedAt":"2026-02-19T03:05:25Z","finishedAt":"2026-02-19T03:10:59Z","containerID":"cri-o://df34220d8bbf9f2c919dd6d16618c4c0582bf76fef0068e3cc67cfd63cba32a9"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5121a0944000b7bfa57ae2e4eb3f412e1b4b89fcc75eec1ef20241182c0527f2","containerID":"cri-o://ff254e606806d258403e28eff2fdee8567998c609505ba8d6b307cec14335600","started":true,"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-vdxnk","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p.json0000640000000000000000000003422015145477636035564 0ustar0000000000000000config/pod/openshift-cloud-controller-manager-operator{"metadata":{"name":"cluster-cloud-controller-manager-operator-cbd75ff8d-gvh6p","generateName":"cluster-cloud-controller-manager-operator-cbd75ff8d-","namespace":"openshift-cloud-controller-manager-operator","uid":"72a6892f-5a69-434b-9dea-11ad5de62a40","resourceVersion":"9168","creationTimestamp":"2026-02-19T03:11:38Z","labels":{"k8s-app":"cloud-manager-operator","pod-template-hash":"cbd75ff8d"},"annotations":{"kubectl.kubernetes.io/default-container":"cluster-cloud-controller-manager"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-cloud-controller-manager-operator-cbd75ff8d","uid":"e0020322-6956-4ae6-b674-c865959790b6","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"images","configMap":{"name":"cloud-controller-manager-images","defaultMode":420}},{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"cloud-controller-manager-operator-tls","secret":{"secretName":"cloud-controller-manager-operator-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-7knmd","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-cloud-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n URL_ONLY_KUBECONFIG=/etc/kubernetes/kubeconfig\nfi\nexec /cluster-controller-manager-operator \\\n--leader-elect=true \\\n--leader-elect-lease-duration=137s \\\n--leader-elect-renew-deadline=107s \\\n--leader-elect-retry-period=26s \\\n--leader-elect-resource-namespace=openshift-cloud-controller-manager-operator \\\n\"--images-json=/etc/cloud-controller-manager-config/images.json\" \\\n--metrics-bind-address=127.0.0.1:9257 \\\n--health-addr=127.0.0.1:9259\n"],"ports":[{"name":"metrics","hostPort":9257,"containerPort":9257,"protocol":"TCP"},{"name":"healthz","hostPort":9259,"containerPort":9259,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"images","mountPath":"/etc/cloud-controller-manager-config/"},{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"kube-api-access-7knmd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"config-sync-controllers","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n URL_ONLY_KUBECONFIG=/etc/kubernetes/kubeconfig\nfi\nexec /config-sync-controllers \\\n--leader-elect=true \\\n--leader-elect-lease-duration=137s \\\n--leader-elect-renew-deadline=107s \\\n--leader-elect-retry-period=26s \\\n--leader-elect-resource-namespace=openshift-cloud-controller-manager-operator \\\n--health-addr=127.0.0.1:9260\n"],"ports":[{"name":"healthz","hostPort":9260,"containerPort":9260,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.33"}],"resources":{"requests":{"cpu":"10m","memory":"25Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"kube-api-access-7knmd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","args":["--secure-listen-address=0.0.0.0:9258","--upstream=http://127.0.0.1:9257/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","hostPort":9258,"containerPort":9258,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"cloud-controller-manager-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-7knmd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-cloud-controller-manager","serviceAccount":"cluster-cloud-controller-manager","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.cloudprovider.kubernetes.io/uninitialized","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:38Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:38Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-rbac-proxy]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:38Z","reason":"ContainersNotReady","message":"containers with unready status: [kube-rbac-proxy]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-19T03:11:38Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-19T03:11:38Z","containerStatuses":[{"name":"cluster-cloud-controller-manager","state":{"running":{"startedAt":"2026-02-19T03:11:41Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","containerID":"cri-o://12eaab8a80e4cd9c13a9fdcf198ebb3908f3df9563070aeb359a2036603cae0b","started":true,"volumeMounts":[{"name":"images","mountPath":"/etc/cloud-controller-manager-config/"},{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-7knmd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"config-sync-controllers","state":{"running":{"startedAt":"2026-02-19T03:11:41Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:69f9df2f6b5cd83ab895e9e4a9bf8920d35fe450679ce06fb223944e95cfbe3e","containerID":"cri-o://5bc30e4426b0c71172cfaab844e3727cb2bafe4f910a7a61776d779d0b2f4037","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-7knmd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"terminated":{"exitCode":1,"reason":"Error","message":"AG: --skip-log-headers=\"false\"\nI0219 03:12:19.115158 1 flags.go:64] FLAG: --stderrthreshold=\"\"\nI0219 03:12:19.115162 1 flags.go:64] FLAG: --tls-cert-file=\"/etc/tls/private/tls.crt\"\nI0219 03:12:19.115167 1 flags.go:64] FLAG: --tls-cipher-suites=\"[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]\"\nI0219 03:12:19.115177 1 flags.go:64] FLAG: --tls-min-version=\"VersionTLS12\"\nI0219 03:12:19.115182 1 flags.go:64] FLAG: --tls-private-key-file=\"/etc/tls/private/tls.key\"\nI0219 03:12:19.115186 1 flags.go:64] FLAG: --tls-reload-interval=\"1m0s\"\nI0219 03:12:19.115192 1 flags.go:64] FLAG: --upstream=\"http://127.0.0.1:9257/\"\nI0219 03:12:19.115196 1 flags.go:64] FLAG: --upstream-ca-file=\"\"\nI0219 03:12:19.115200 1 flags.go:64] FLAG: --upstream-client-cert-file=\"\"\nI0219 03:12:19.115204 1 flags.go:64] FLAG: --upstream-client-key-file=\"\"\nI0219 03:12:19.115208 1 flags.go:64] FLAG: --upstream-force-h2c=\"false\"\nI0219 03:12:19.115212 1 flags.go:64] FLAG: --v=\"3\"\nI0219 03:12:19.115216 1 flags.go:64] FLAG: --version=\"false\"\nI0219 03:12:19.115222 1 flags.go:64] FLAG: --vmodule=\"\"\nW0219 03:12:19.115236 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0219 03:12:19.115246 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml\nI0219 03:12:19.116059 1 kube-rbac-proxy.go:233] Valid token audiences: \nI0219 03:12:19.117518 1 kube-rbac-proxy.go:347] Reading certificate files\nE0219 03:12:19.117592 1 run.go:72] \"command failed\" err=\"failed to initialize certificate reloader: error loading certificates: error loading certificate: open /etc/tls/private/tls.crt: no such file or directory\"\n","startedAt":"2026-02-19T03:12:19Z","finishedAt":"2026-02-19T03:12:19Z","containerID":"cri-o://5529b98414d662a9cc0972b06b3df8cc65469cce83c638edceb32ef3e87b9f11"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"AG: --skip-log-headers=\"false\"\nI0219 03:11:55.060288 1 flags.go:64] FLAG: --stderrthreshold=\"\"\nI0219 03:11:55.060291 1 flags.go:64] FLAG: --tls-cert-file=\"/etc/tls/private/tls.crt\"\nI0219 03:11:55.060294 1 flags.go:64] FLAG: --tls-cipher-suites=\"[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]\"\nI0219 03:11:55.060305 1 flags.go:64] FLAG: --tls-min-version=\"VersionTLS12\"\nI0219 03:11:55.060309 1 flags.go:64] FLAG: --tls-private-key-file=\"/etc/tls/private/tls.key\"\nI0219 03:11:55.060312 1 flags.go:64] FLAG: --tls-reload-interval=\"1m0s\"\nI0219 03:11:55.060316 1 flags.go:64] FLAG: --upstream=\"http://127.0.0.1:9257/\"\nI0219 03:11:55.060319 1 flags.go:64] FLAG: --upstream-ca-file=\"\"\nI0219 03:11:55.060321 1 flags.go:64] FLAG: --upstream-client-cert-file=\"\"\nI0219 03:11:55.060332 1 flags.go:64] FLAG: --upstream-client-key-file=\"\"\nI0219 03:11:55.060334 1 flags.go:64] FLAG: --upstream-force-h2c=\"false\"\nI0219 03:11:55.060337 1 flags.go:64] FLAG: --v=\"3\"\nI0219 03:11:55.060340 1 flags.go:64] FLAG: --version=\"false\"\nI0219 03:11:55.060344 1 flags.go:64] FLAG: --vmodule=\"\"\nW0219 03:11:55.060354 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0219 03:11:55.060365 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml\nI0219 03:11:55.061012 1 kube-rbac-proxy.go:233] Valid token audiences: \nI0219 03:11:55.062086 1 kube-rbac-proxy.go:347] Reading certificate files\nE0219 03:11:55.062148 1 run.go:72] \"command failed\" err=\"failed to initialize certificate reloader: error loading certificates: error loading certificate: open /etc/tls/private/tls.crt: no such file or directory\"\n","startedAt":"2026-02-19T03:11:55Z","finishedAt":"2026-02-19T03:11:55Z","containerID":"cri-o://e61212b37209e14fce7d3564e726376978dfd67ae4437e0380548c4d12109772"}},"ready":false,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb2014728aa54e620f65424402b14c5247016734a9a982c393dc011acb1a1f52","containerID":"cri-o://5529b98414d662a9cc0972b06b3df8cc65469cce83c638edceb32ef3e87b9f11","started":false,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"cloud-controller-manager-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-7knmd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515145477636023237 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115145477636025447 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715145477636025147 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715145477636025156 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315145477636022267 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515145477636026723 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115145477636023426 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115145477636023222 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115145477636025512 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002106515145477636025520 0ustar0000000000000000{"metadata":{"name":"edit","uid":"644f6059-a0bc-4c5c-8c2a-a0d17cae4ac4","resourceVersion":"7157","creationTimestamp":"2026-02-19T02:58:16Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002375215145477636025670 0ustar0000000000000000{"metadata":{"name":"admin","uid":"339f0650-99b9-48ca-a173-355a7e644007","resourceVersion":"7161","creationTimestamp":"2026-02-19T02:58:16Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315145477636023464 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"de21511f-920c-4df4-8af5-59309f154aa4","resourceVersion":"5321","generation":1,"creationTimestamp":"2026-02-19T03:05:14Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-19T03:05:14Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-19T03:05:14Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-19T03:05:14Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015145477636022067 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"88feff79-6a59-4719-a5d0-687110c49d28","resourceVersion":"5304","generation":1,"creationTimestamp":"2026-02-19T03:05:14Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-19T03:05:14Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-19T03:05:14Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-19T03:05:14Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215145477636020216 0ustar0000000000000000[]config/apiserver.json0000640000000000000000000000121615145477636013422 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"670dea7b-1563-42ab-b202-c624c9b7fdc5","resourceVersion":"910","generation":1,"creationTimestamp":"2026-02-19T02:59:41Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/infrastructure.json0000640000000000000000000000106515145477636014504 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"3b493016-954a-45f6-86c0-0cd4e08ac07e","resourceVersion":"535","generation":1,"creationTimestamp":"2026-02-19T02:59:10Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115145477636025316 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"a367673a-7e62-483d-8d8d-74f1a3bb527d","resourceVersion":"4428","generation":2,"creationTimestamp":"2026-02-19T03:00:06Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001074515145477636026754 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"126a1d33-a5a7-461f-8e96-4c3e1e153520","resourceVersion":"6484","generation":1,"creationTimestamp":"2026-02-19T03:05:37Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"97a1c707-3ac3-408c-9705-7aae071fa0de","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eA=="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eA=="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715145477636024043 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"1e7ae2a3-df01-4d91-9347-9774f569ae9f","resourceVersion":"4427","generation":2,"creationTimestamp":"2026-02-19T03:03:54Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"97a1c707-3ac3-408c-9705-7aae071fa0de","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000223415145477636030647 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"83375818-6b10-47e8-adea-1bfe1d6dfd4a","resourceVersion":"8589","generation":1,"creationTimestamp":"2026-02-19T03:11:28Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443}},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000164315145477636032136 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"0ad5c1db-29bb-4d08-98d9-eca61b37bfab","resourceVersion":"8979","generation":1,"creationTimestamp":"2026-02-19T03:11:41Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443}},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/oauth.json0000640000000000000000000000114415145477636012542 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"60f527f2-9169-4989-a61d-c2df945cf772","resourceVersion":"1697","generation":1,"creationTimestamp":"2026-02-19T02:59:58Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}events/openshift-machine-api.json0000640000000000000000000001171115145477636015632 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-19T03:07:05Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_control-plane-machine-set-operator-686847ff5f-xbcf5_openshift-machine-api_0664d88f-f697-4182-93cd-f208ff6f3ac2_0(94c34c88631fea947a70afc413213c3b831b6cc9e78ddd4713f7e9cf39ef2d97): error adding pod openshift-machine-api_control-plane-machine-set-operator-686847ff5f-xbcf5 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"94c34c88631fea947a70afc413213c3b831b6cc9e78ddd4713f7e9cf39ef2d97\" Netns:\"/var/run/netns/a10eb08b-9f18-49a5-ad51-96fb965e0151\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=control-plane-machine-set-operator-686847ff5f-xbcf5;K8S_POD_INFRA_CONTAINER_ID=94c34c88631fea947a70afc413213c3b831b6cc9e78ddd4713f7e9cf39ef2d97;K8S_POD_UID=0664d88f-f697-4182-93cd-f208ff6f3ac2\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/control-plane-machine-set-operator-686847ff5f-xbcf5] networking: Multus: [openshift-machine-api/control-plane-machine-set-operator-686847ff5f-xbcf5/0664d88f-f697-4182-93cd-f208ff6f3ac2]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod control-plane-machine-set-operator-686847ff5f-xbcf5 in out of cluster comm: SetNetworkStatus: failed to update the pod control-plane-machine-set-operator-686847ff5f-xbcf5 in out of cluster comm: status update failed for pod /: unexpected error when reading response body. Please retry. Original error: net/http: request canceled (Client.Timeout or context cancellation while reading body)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-19T03:08:06Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_control-plane-machine-set-operator-686847ff5f-xbcf5_openshift-machine-api_0664d88f-f697-4182-93cd-f208ff6f3ac2_0(041c747b5ce1ee8dc275996831f45db206f8a96a46ccd7a178bbe25db7a4ad67): error adding pod openshift-machine-api_control-plane-machine-set-operator-686847ff5f-xbcf5 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"041c747b5ce1ee8dc275996831f45db206f8a96a46ccd7a178bbe25db7a4ad67\" Netns:\"/var/run/netns/fb72be9f-df85-41a8-b03b-a1b4810c9174\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=control-plane-machine-set-operator-686847ff5f-xbcf5;K8S_POD_INFRA_CONTAINER_ID=041c747b5ce1ee8dc275996831f45db206f8a96a46ccd7a178bbe25db7a4ad67;K8S_POD_UID=0664d88f-f697-4182-93cd-f208ff6f3ac2\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/control-plane-machine-set-operator-686847ff5f-xbcf5] networking: Multus: [openshift-machine-api/control-plane-machine-set-operator-686847ff5f-xbcf5/0664d88f-f697-4182-93cd-f208ff6f3ac2]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod control-plane-machine-set-operator-686847ff5f-xbcf5 in out of cluster comm: SetNetworkStatus: failed to update the pod control-plane-machine-set-operator-686847ff5f-xbcf5 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/control-plane-machine-set-operator-686847ff5f-xbcf5?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-19T03:12:08Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-autoscaler-operator-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-19T03:12:10Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : secret \"machine-api-operator-tls\" not found","type":"Warning"}]}config/authentication.json0000640000000000000000000000132315145477636014440 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"761e076c-5d5b-4ea3-bea1-ad599bc60ecd","resourceVersion":"6356","generation":2,"creationTimestamp":"2026-02-19T02:59:47Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955"}]},"spec":{"type":"","oauthMetadata":{"name":""},"webhookTokenAuthenticator":{"kubeConfig":{"name":"webhook-authentication-integrated-oauth"}},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/featuregate.json0000640000000000000000000000613615145477636013724 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"656037ab-2783-4e78-9398-1ba85d8eaaed","resourceVersion":"640","generation":1,"creationTimestamp":"2026-02-19T02:59:32Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.33","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000174015145477636025136 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"f8f48590-6310-46fa-bfde-766b64046c6f","resourceVersion":"1627","generation":1,"creationTimestamp":"2026-02-19T02:59:56Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":0,"currentHealthy":0,"desiredHealthy":0,"expectedPods":0,"conditions":[{"type":"DisruptionAllowed","status":"False","observedGeneration":1,"lastTransitionTime":"2026-02-19T02:59:56Z","reason":"InsufficientPods","message":""}]}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615145477636027520 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"955e95c5-4238-459c-92c8-cf6ab1f09fda","resourceVersion":"6472","generation":2,"creationTimestamp":"2026-02-19T03:05:36Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/machineconfigpools/worker.json0000640000000000000000000000106515145477636016604 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-19T03:11:38Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"8935","uid":"018bb8a1-cd08-47d8-abf9-b7a4f94a407d"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117215145477636016565 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-19T03:11:38Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"8934","uid":"b3b368c9-098f-498c-a425-673106c11f9c"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/schedulers/cluster.json0000640000000000000000000000052415145477636015245 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"6532f0f4-35ba-40d5-9a50-36559feabc10","resourceVersion":"558","generation":1,"creationTimestamp":"2026-02-19T02:59:13Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/proxy.json0000640000000000000000000000031315145477636012600 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"a80000ad-c281-466e-ac52-5c33766c01bc","resourceVersion":"553","generation":1,"creationTimestamp":"2026-02-19T02:59:11Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/network.json0000640000000000000000000000117015145477636013112 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"48368cd6-2afd-4de2-99e0-fd27d21974ab","resourceVersion":"3188","generation":2,"creationTimestamp":"2026-02-19T02:59:11Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/ingress.json0000640000000000000000000000043615145477636013077 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"38e423f3-c398-4295-82e0-3cfef4cf4725","resourceVersion":"549","generation":1,"creationTimestamp":"2026-02-19T02:59:10Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/image.json0000640000000000000000000000111715145477636012504 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"3954e470-eea6-4f18-95a8-0df6ac1061bf","resourceVersion":"1564","generation":1,"creationTimestamp":"2026-02-19T02:59:55Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"4ca4c4f8-f6d5-416d-b628-782633877955"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115145477636027770 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"b9cffffc-b6aa-4eda-acc8-40adf49f931a","resourceVersion":"5902","generation":1,"creationTimestamp":"2026-02-19T03:05:25Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-19T03:05:26Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-02-19T03:05:26Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-02-19T03:05:26Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-19T03:05:26Z","reason":"AsExpected"}]}}